Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

Ten top tips for innovators

8th September 2020 peterglock

We have produced a series of data protection tips that anybody involved in any sector can utilise when innovating to ensure that they are building in the right data protection compliance from the outset.

Original article here

Glock Takes Stock permalink

Post navigation

← Quarter of company desktops lack security software, survey shows
Microsoft Patch Tuesday, Sept. 2020 Edition →

Recent Posts

  • Microsoft fixes actively exploited Exchange zero-day bugs, patch now
  • Education institutions must recognise that each and every laptop is a potential route in for a malicious hacker
  • Alarming Cybersecurity Stats: What You Need To Know For 2021
  • Payroll/HR Giant PrismHR Hit by Ransomware?
  • Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

6 hours ago

Glock Enterprises Ltd
buff.ly/2Ptmw7YEducation institutions must recognise that each and every laptop is a potential route in for a malicious hackerWhen I see comments like the one below I wonder if the author has any direct experience of students. There’s little or no chance that any of my children would permit their university to remote wipe their laptop. I like to think that they are all reasonably cautious in their cyber hygiene otherwise their dad will hack them when they pop home.The article itself makes some good points about the role of further education in cyber security so it’s worth a read. Just ignore the following para...:[...] The reality is that online learning in some capacity is now here to stay and organisations need to ensure they have the necessary security systems in place to protect against outsider cyber threats. That’s why it’s vital that schools and higher education institutions recognise that each and every laptop is a potential route in for a malicious hacker. Tackling this issue means having complete visibility into the device network, so that every laptop can be properly protected with encryption technologies, as well as having the ability to track, freeze and wipe devices in the event of theft or loss.”[...]Original article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes