top of page


The Silent Peril - Death by DPIA
We are all familiar with the infamous phrase "death by PowerPoint" but let's shine a spotlight on another critical issue that often flies under the radar: "Death by DPIA"
Barry Moult
Oct 161 min read


The Silent Peril - IAR/ROPA
We’re all familiar with the infamous phrase “death by PowerPoint,” but it's time to shine a spotlight on another critical issue that...
Barry Moult
Oct 101 min read


Sharenting and the risk to Children's Digital Privacy and wellbeing
Many parents share photos and personal details about their children online. This is known as sharenting. While it often stems from love...
fabiodocarmoesouza7
Oct 33 min read


Why the Cyber Essentials certification Is crucial for Your Business.
The consequences of Cyber-attacks on small businesses: Cyber-attacks don’t just affect large corporations. Small and medium-sized...
Berzin Daruwala
Aug 282 min read


Ransomware in the UK: Scope, Impact and Policy Response
According to the UK government's Cyber Security Breaches Survey 2025 , around 1% of all UK businesses experienced a ransomware crime in...
Berzin Daruwala
Aug 144 min read


The Internet of Threats: Securing Our Smart devices
Intro to IoT Over 50% of Internet of Things (IoT) devices have critical vulnerabilities that hackers can exploit right now. Even more...
Berzin Daruwala
Jul 234 min read


Drawing the Digital Line: The Ethics and Consequences of Non-Consensual Cyber Security Scanning
Impact of Unauthorised Disclosure on Systems and Staff Cyber security recon is a core practice used to assess vulnerabilities and...
Berzin Daruwala
Jul 113 min read


The "2+2=5" Concept: A Subtle Tactic in Social Engineering
Understand the core Idea Social engineering relies on psychological manipulation to extract information from unsuspecting individuals,...
Berzin Daruwala
Jul 24 min read


How Your Digital Footprint Puts You at Risk
Social media has transformed how we connect, but it comes with hidden risks. Many users unknowingly share personal details that can be...
Berzin Daruwala
Jun 113 min read


The Silent Peril - Death by Policy
We’re all familiar with the infamous phrase “death by PowerPoint,” but it's time to shine a spotlight on another critical issue that...
yagmursahin9
Sep 4, 20241 min read


On the naughty list: Cyber Criminals
Holidays are rapidly approaching and as usual, for me anyway, everything will be done at the last possible minute which this year may be...
Sean Palmariellodiviney
Dec 1, 20222 min read


Cyber Security - Work from Home Statistics
With the introduction of Covid-19 the world has changed in many ways. We saw changes take place in all aspects of life, and the workplace...
Tania Palmariellodiviney
May 12, 20224 min read


7 Quick Tips for good GDPR practice
‘Tis the season to be jolly’ but don’t forget to protect your data along the way! Welcome back to my blog where we talk about anything...
Tania Palmariellodiviney
Dec 22, 20214 min read


What is an Internet Cookie?
Hello everyone and welcome back to my to another week of my (hopefully) informative blog posts. With Christmas just round the corner we...
Tania Palmariellodiviney
Nov 6, 20214 min read


Data Privacy Simplified 101
#GDPR Hi there and welcome back to Data Privacy Simplified 101! This will be the second of many instalments in our blog post series where...
Tania Palmariellodiviney
Oct 4, 20215 min read


Data Privacy Simplified 101 #Data Protection
Hi there and welcome to Data Privacy Simplified 101! This will be the first of many instalments in our blog post series where we will...
Tania Palmariellodiviney
Sep 15, 20213 min read
bottom of page

