Data Protection

EMAIL SECURITY BEST PRACTICES

Since organisations rely heavily on email to communicate and conduct business operations, cyber-criminals commonly target email as an entry point to access networks and breach valuable business data. Indeed, a single misclick from an employee might be all a cyber-criminal needs to breach an organisation’s cyber-defences. This is why email security is so vital. Following

EMAIL SECURITY BEST PRACTICES Read More »

CYBER RISKS AND LIABILITIES

Understanding cyber espionage. Cyber-espionage is a type of cyber-attack that involves an unauthorised user (or multiple users) accessing a victim’s sensitive information in order to secure economic benefits, competitive advantages or political gain. The document attached notes how to safeguard your organisation with best practices to keep safe.

CYBER RISKS AND LIABILITIES Read More »

NEWS BRIEF

Cyber-attacks Continue Across UK and Europe On 6th September, Intercontinental Hotels Group (IHG)—the owner of Holiday Inn—confirmed it had fallen victim to a cyber-attack. In a statement, IHG said it was investigating “unauthorised access” to a number of technology systems. The acknowledgement comes two days after the UK-based company’s booking channels were disrupted, preventing many

NEWS BRIEF Read More »

SAFETY MATTERS

Preventing Laptop Theft Laptops and other small personal electronic devices are desirable items for thieves. They can easily be resold, and thieves can make a quick profit. If your personal laptop is stolen, it may only affect you. But if your stolen laptop contains work information or is owned by the company you work for,

SAFETY MATTERS Read More »

RS Risk Solutions Logo

Request a callback

By providing the above information you consent to RS Risk Solutions Limited contacting you by any of the methods that you have provided details for. We will process this information in accordance with our privacy notice.

RS Risk Solutions uses cookies to monitor the performance of this website and improve user experience. To find out more about cookies, what they are and how we use them, please see our privacy notice, which also provides information on how to delete cookies from your hard drive.