Content hub

Sam Kendall

Search
4 Min

From Reactive to Proactive: Building a Future-Ready Security Programme

Podcast with ING CISO Debbie Janeczek on proactive security, operational resilience, and safe AI - building trust before...

woman using laptop in university
4 Min

To Secure or Not to Secure: What Counts as PII and Why?

Personally identifiable information (PII) explained, with simple examples and practical tips on when to encrypt emails and...

Man on laptop virtual call
5 Min

How Do You Lock a Word Document, and Is It Secure?

Learn how to lock a Word document with a password on Windows, Mac, and mobile - and when to use...

Man sending misdirected email
7 Min

What Is Misdirected Email and Why Does It Matter?

What is misdirected email and why does it matter? Learn how to prevent human-error breaches and...

Allan Christian from Precisely
5 Min

Harnessing Data for Hyper-Personalised Customer Communications in the AI Era

Learn how to leverage first-party data for hyper-personalisation, maintain trust and compliance,...

Charlotte Hooper Head of Operations The Cyber Helpline
5 Min

Your Customer’s Worst Day: How to Be Ready When Cybercrime Hits

Learn how to support customers during cybercrime crises with empathy, clarity,...

Woman getting into her account using a passkey
5 Min

What Is a Passkey and Is It Safe?

Learn what passkeys are, how they work, and why they could offer a safer,...

Leslee Ross Scottish Widows
5 Min

Scottish Widows’ Digital Transformation: Customer Experience at Scale

How Scottish Widows is transforming their financial services with digital...