Content hub

Search
8 Min

PII and Secure Client Communication: Why Your Insurance Depends On It

Learn how aligning Professional Indemnity Insurance (PII) with secure client communication can protect your firm from breaches...

4 Min

From Reactive to Proactive: Building a Future-Ready Security Programme

Learn how ING's CISO Debbie Janeczek is transforming security from reactive to proactive, emphasising resilience, AI safety,...

woman using laptop in university
4 Min

To Secure or Not to Secure: What Counts as PII and Why?

Learn what counts as PII, when to secure personal information, and how simple tools like encryption...

liz brandt and nick cabrera
6 Min

Ctrl-Shift: Driving the Smart Data Revolution

Discover how Smart Data is transforming UK data sharing with trust, interoperability, and...

Male showing his UK driving licence
9 Min

What To Do About Digital ID in the UK: Do We Need It?

Digital identity in the UK is taking shape. Paul Holland explains how trust, inclusion, and...

Man on laptop virtual call
5 Min

How Do You Lock a Word Document, and Is It Secure?

Learn how to lock a Word document with a password on Windows, Mac, and mobile -...

Woman using her credit card online
4 Min

How Data Sovereignty Is Reshaping Business Strategies

What data sovereignty means, why it’s accelerating, and how organisations can...

family using a laptop for life admin
6 Min

Why You Shouldn’t Keep Your Life Admin on a Laptop

Keeping life admin on a laptop is risky. See practical steps to secure access,...