Articles tagged ‘Security’ Blog 14 May 2020 What happens when the security solution becomes the security problem? Passwords have always been seen as a secure way to restrict access, however, the number of passwords each person is now required to remember is a security issue in itself… Blog 8 April 2020 How to ensure your HR tech is secure This sentiment is echoed by many data protection regulations around the world, such as the General Data Protection Regulation (GDPR) in Europe where this type of HR data attracts an… Blog 7 April 2020 Maintaining data protection whilst remote working Working from home presents some interesting challenges when processing payrolls that used to involve paper timesheets mailed into the office or spreadsheets downloaded from a central repository. There aren’t many… Blog 10 July 2019 GDPR: One year on and where’s it gone? July 2019 update: Two months ago, MHR’s DPO Lesley Holmes predicted that 2019 would be the year GDPR really got going and that 2018 had just been a transitional year… Blog 9 April 2018 The GDPR: what do HR professionals need to know? To help you get your head around the coming changes, here are some of the key GDPR issues for HR professionals – and some tips on how to prepare. Employee… Blog 3 April 2018 GDPR Data Mapping: a practical step to process data safely at every stage Let’s focus on how you can use a data map to ensure that a data subject’s rights are upheld, as the GDPR requires organisations to comply with the GDPR Principles… Blog 12 March 2018 GDPR: the Truth About Fines This blog aims to shed some light on the different penalties and actions that can be imposed by the ICO for GDPR non-compliance, and the conditions that could lead to… Blog 22 February 2018 GDPR: The rights of individuals and how to adhere GDPR provides rights through the relationship between data controllers and data subjects. But what are data controllers and data subjects? And what are the rights of the individual? Essentially data… Blog 11 January 2018 Meltdown and Spectre: the Latest Security Threat Explained The flaws, found in processors designed by Intel, AMD and ARM, could leave sensitive personal information, such as passwords and banking details, open to attack from hackers via user and… Blog 11 December 2017 Data Security – What Can Organisations Do to Mitigate the Risks? Data breaches can cause long-lasting damage to an organisation’s reputation, but it’s not just about brand image – organisations have a legal responsibility to keep data safe, with heavy penalties… Pagination Previous page Page 1 Current page 2 Page 3 Next page