At Data Influence our super power is interpreting GDPR and Cybersecurity. We make the complex feel simple, and we get the job done.
Whether you're an entrepreneur, small business owner or a multi-team organisation, we will help you get your GDPR in order and build CyberSecurity into your business. Its called peace of mind.
" We contracted Andrea to review our data security, manuals and procedures, and GDPR compliance. The project has been very successful, our systems were all given excellent reviews but of course with various suggestions for improvements and best practice in regards actual data security, which we are implementing. So the value add has been worth all the money spent on it."
— Raaji Singh Bharij
CEO, Adventures Expeditions & Safaris (EAS)
If your email account has been hacked there are 3 steps you need to take to secure your account. Most people will do the first two but often not know to check whether email forwarding has been set up.
How safe are public USB charging points? Juice Jacking as it's called is a form of cyber attack and can affect your laptop or your phone. If the charging port has been infected with malware it can be used to extract information from your device or upload malware to it. It's not happening every day nor is it happening on every public charging point but it is worth being aware of. Think of it like the cashpoint skimming devices -if it's in an area where it can be tampered with, all it takes is one bad guy.
The Data Protection Commission has issued a warning that from October website owners will no longer get away with offering a banner that says "OK" to all cookies. We set out the three essential steps you need to take to make sure your cookies are done right.