Research Posts

five years of gdpr report

Report: Five Years of GDPR – From Revolution to Evolution

Download your free report now! Discover the profound impact of the General Data Protection Regulation…

Read more
a cyborg human-like robot on a blurred background indicating AI

Privacy and AI: how do you balance innovation and protecting personal data

Artificial Intelligence (AI) has become an increasingly hot topic in recent months. While some famous…

Read more
computer screens

Endpoint Detection and Response (EDR) – Common Pitfalls

A common strand of activity for us here at Reliance Cyber surrounds Incident Response; helping…

Read more
someone holding a mobile phone at a desk, tightly cropped

What Does the Cyber Essentials 2023 Update Really Mean?

In 2022, National Cyber Security Centre (NCSC), the UK’s technical authority for cybersecurity, released a…

Read more
a london skyline overlaid with an orange block colour

Handling a data subject access request: the good, the bad and the occasionally very ugly

For those living in the UK and the EU, access to personal data is a…

Read more
bright lines and dots indicating a network on a dark background

How to build wireless-first and wireless-only enterprise networks… and how not to

Wireless technology has proven its value in terms of ubiquity and convenience over the past…

Read more
a computer circuit board

Privacy-Enhancing Technologies (PETs) – shortcut to compliance or road to ruin?

In September, the UK Information Commissioner’s Office (ICO) issued new guidance on privacy-enhancing technologies (PETs).…

Read more
a hand on a dark background holding floating envelopes indicating emails

What is Business Email Compromise – and why it is so dangerous?

Many organisations cover phishing attacks in their cyber security training, and most employees are familiar…

Read more
Man working on laptop in server room

What counts as ‘personal data’?

Senior Security Consultant, Shaun Wakefield, highlights what really counts as personal data. Imagine creating a…

Read more
woman using a mobile phone and a laptop

Top three Office 365 security tips for SMEs

It is well established that the majority of cyber attacks on organisations use email. These…

Read more

Book your free 30-minute cyber security consultation