GDPR & Cyber Security Solutions for the SME  —

Helping you protect your business and your customers

Work with us

At Data Influence our super power is interpreting GDPR and Cybersecurity. We make the complex feel simple, and we get the job done.

Whether you're an entrepreneur, small business owner or a multi-team organisation, we will help you get your GDPR in order and build CyberSecurity into your business. Its called peace of mind.

WHAT WE DO

GDPR and CyberSecurity

Training icon
Training
We train people to think instinctively. Engage your team with GDPR and security awareness training that is tailored to the audience. We teach through the powerful art of storytelling.

We specialise in 121 training in GDPR and Cybersecurity for business owners.
GDPR icon
Simply GDPR
If you are processing or storing customer and employee data you're obligated to comply with the General Data Protection Regulation.

To do your GDPR it requires auditing and a good deal of documentation. We  walk you through the steps, providing practical advice and solutions.
Cybersecurity Audit icon
Cybersecurity Audits
Review your website security, social media account settings and clean up your digital footprint.

Book a cybersecurity audit — a systematic process that takes you through all the steps towards editing and cleaning up your personal and business digital presence, making you safer online.
" We contracted Andrea to review our data security, manuals and procedures, and GDPR compliance. The project has been very successful, our systems were all given excellent reviews but of course with various suggestions for improvements and best practice in regards actual data security, which we are implementing. So the value add has been worth all the money spent on it."

— Raaji Singh Bharij
CEO, Adventures Expeditions & Safaris  (EAS)

insights

News and Advice

3 steps to take when your email has been hacked
Dec 16, 2020

If your email account has been hacked there are 3 steps you need to take to secure your account. Most people will do the first two but often not know to check whether email forwarding has been set up.

Are public USB charging points safe?
Nov 6, 2020

How safe are public USB charging points? Juice Jacking as it's called is a form of cyber attack and can affect your laptop or your phone. If the charging port has been infected with malware it can be used to extract information from your device or upload malware to it. It's not happening every day nor is it happening on every public charging point but it is worth being aware of. Think of it like the cashpoint skimming devices -if it's in an area where it can be tampered with, all it takes is one bad guy.

How to do cookies the GDPR way
Aug 17, 2020

The Data Protection Commission has issued a warning that from October website owners will no longer get away with offering a banner that says "OK" to all cookies. We set out the three essential steps you need to take to make sure your cookies are done right.

Find the value in Data Protection
The most valuable asset in your business is your people.
Next is your data.
We help your people protect your data
Work with Us