Content hub

Search
8 Min

PII and Secure Client Communication: Why Your Insurance Depends On It

Learn how aligning Professional Indemnity Insurance (PII) with secure client communication can protect your firm from breaches...

4 Min

From Reactive to Proactive: Building a Future-Ready Security Programme

Podcast with ING CISO Debbie Janeczek on proactive security, operational resilience, and safe AI - building trust before...

woman using laptop in university
4 Min

To Secure or Not to Secure: What Counts as PII and Why?

Personally identifiable information (PII) explained, with simple examples and practical tips on...

liz brandt and nick cabrera
4 Min

Ctrl-Shift: Driving the Smart Data Revolution

A podcast discussion with Ctrl-Shift on Smart Data, consent, governance, and what it will take to...

Male showing his UK driving licence
9 Min

What To Do About Digital ID in the UK: Do We Need It?

Digital identity in the UK is taking shape. Paul Holland explains how trust, inclusion, and...

Man on laptop virtual call
5 Min

How Do You Lock a Word Document, and Is It Secure?

Learn how to lock a Word document with a password on Windows, Mac, and mobile -...

Woman using her credit card online
4 Min

How Data Sovereignty Is Reshaping Business Strategies

What data sovereignty means, why it’s accelerating, and how organisations can...

family using a laptop for life admin
6 Min

Why You Shouldn’t Keep Your Life Admin on a Laptop

Keeping life admin on a laptop is risky. See practical steps to secure access,...