Content hub

data-compliance

Search
7 Min

Types of Email Encryption

Discover the various types of email encryption, their strengths, and limitations to ensure your emails remain secure throughout...

Lee Curtis CEO of Seguro Technology
7 Min

The Importance of Cybersecurity in Digital Customer Communications

Discover how to safeguard digital customer communications from cyber threats with expert insights and strategies from Lee...

Man shocked at having clicked on a phishing link
4 Min

Help! I Clicked on a Phishing Link (What to Do)

Learn how to handle a phishing attack if you've clicked on a malicious link. Act fast, follow the...

Sam Howell Burges Salmon podcast
3 Min

Cybersecurity In Pensions: Breaking Down The Regulatory Guidance

Learn about the latest regulatory updates, the rising threats in the industry, and best practices...

CEO and colleague looking at laptop to send secure communications
8 Min

Business Email Compromise: The New UK Guidance

Discover the alarming rise of Business Email Compromise (BEC) and the new UK guidance designed to...

Professional team looking at computer together in office
3 Min

What Is the Digital Operational Resilience Act (DORA)?

DORA is the EU regulation raising ICT resilience standards in financial...

Billy Burnside on the sense of identity podcast
2 Min

Fintech Explosion: Creating Data Continuity in an Evolving Ecosystem

Explore the evolution of fintech and the importance of data standards in the...

Chris Davies on the Beyond Encryption podcast
3 Min

The ‘Silent Cyber’ in Professional Indemnity Cover with Chris Davies

Explore the evolving landscape of cyber risk and professional indemnity cover...