The Data Privacy & Tailored Risk Blog

Encryption

How Pseudonymisation Can Be Used Under GDPR

Those familiar with the General Data Protection Regulation will likely have come across the term “pseudonymisation”. The legislation requires the...

Get Your Data Protection Right

Data Breaches Can Happen: What Will Your Response Be?

It’s time to discuss one of the horrible truths of data protection and cybersecurity. This is that breaches will happen, no matter how many steps and […]

Compliance

5 Barriers Hindering GDPR Compliance

Data security is no longer a suggested practice; it’s mandated. In 2018, security breaches compromised more than 4.5 billion data records worldwide. The...