
7 Cyber Security Threats for 2026: What Lies Ahead?
Cyber security is evolving fast. As organisations race to adopt new tools, attackers move just as quickly to exploit gaps. What will 2026 look

Cyber security is evolving fast. As organisations race to adopt new tools, attackers move just as quickly to exploit gaps. What will 2026 look

Soft Opt-In for Charities: Preparing for Low-Risk Direct Marketing Changes The UK’s Data (Use and Access) Act, which received Royal Assent on 19 June 2025,

What does the Data (Use and Access) Act 2025 change? The Data (Use and Access) Act 2025, which received Royal Assent on 19 June 2025,

The Metropolitan Police arresting over 500 individuals on Saturday 9th August under the Terrorism Act 2000 was seen by some as a heavy handed approach.

Phishing is an ever prevalent tactic used by cybercriminals, and therefore it remains a hot topic for data protection professionals. Across all industries we have

Your organisation’s reputation takes years to build, but only moments to destroy. From one small mistake, like sending an email to the wrong client or

A Legal Analysis of PECR and UK GDPR Enforcement (2019–2025): A Warning to Data Controllers on the enactment of the Data (Use and Access) Act.

I’ve been following a story that’s deeply troubling, and I think it’s a crucial lesson for anyone who handles sensitive data. Channel 4 recently reported

If you’re unfamiliar with the phrase ‘Internet of Things’, you’d be forgiven for having no idea what it could possibly refer to. It does sound

If ‘Black Mirror’ has taught us anything, it’s that technology is only as smart, or as dangerous, as the people using it. Some may say

Have you noticed a sharp increase in how often you receive these spam messages, emails and calls in the last few years? I have, too.

There’s something that feels a little funny about giving these details out verbally, where the people around you can overhear.
