CBS Intelligence Centre
- June 23, 2017
Preparing for GDPR – Is The UK Ready?
Preparing for GDPR is going to be one of the most important changes your law firm puts into place over the next year, but how ready are you? Although the process need not be taxing with the right help and guidance, some organisations are still struggling to meet the bar. In fact, according to... Read more
- June 16, 2017
IT Backup Routines – Why They Are So Important
Backing up your data is a fundamental part of using information technology. Whether you are a student backing up essays and assignments, or a lawyer in a law firm, all technology has the potential to fail you once in a while. However, when your business depends on it, an IT failure can be dis... Read more
- June 9, 2017
6 Sure Fire Ways To Boost Your Cyber Security
Cyber security is a subject which should always be a foremost concern for any business, but with recent events such as the large-scale NHS hack – part of a global attack – it is no wonder many businesses are looking to boost cyber security in whatever way they can. Hackers are alw... Read more
- June 2, 2017
General Data Protection Regulation for Lawyers
The General Data Protection Regulation (GDPR) is a new EU regulation which replaces the UK’s Data Protection Act 1998. For any type of organisation dealing with individuals’ personal data, there are a number of changes which will need to be taken into account. When considering GDP... Read more
- May 25, 2017
Perimeter Security – What You Need To Know
Perimeter security is the first point of defence in any computer network. Its purpose is to ensure that only those who are authorised can access an organisation’s computer network. Within the perimeter, you must then have secondary lines of defence which protect specific items, document... Read more
- May 19, 2017
Blockchain and Cybersecurity – A Beginner’s Guide
We are constantly reminded of the threats posed by malicious outside agencies to our private and corporate data. Cyber security attacks occur daily, and those developing the technology to carry out attacks are sometimes able to evolve quicker than the average organisation’s security fea... Read more
- May 12, 2017
Malware – A Guide For Lawyers
Nearly 40% of businesses have been attacked by ransomware, one of the most common types of malware, according to recent research. This shows just how serious the threat is to modern businesses from the rise in malware and, unfortunately, law firms are no exception. Although malware is a probl... Read more
- May 5, 2017
GDPR Compliance – What Is Involved?
From 25th May 2018, the new EU GDPR legislation will affect all organisations that process the data of individual EU residents. Although the UK is poised to be leaving the EU in the aftermath of the Brexit vote, the government and the ICO have confirmed that the General Data Protection Regula... Read more
- April 28, 2017
General Data Protection Regulation: Are You Ready?
Recent research conducted by Veritas has confirmed that 54% of organisations have yet to prepare themselves for the commencement of the EU’s new General Data Protection Regulation policy, which will come into effect in May 2018. Perhaps this is due to a misunderstanding regarding the UK’s... Read more
- April 21, 2017
5 Hassle-Free Ways To Improve Business IT Performance
In comparison to how we conducted business a decade or so ago, technology is now at the forefront of business innovation. Companies are in an ongoing race to adapt with the times and utilise the best digital services and products that are on the market, in order to push their organisation to ... Read more
- April 13, 2017
Cloud Security Failure – 4 Ways to Avoid It
Cloud-computing is revolutionising the way businesses work, making it easier to access and share resources flexibly and cost-effectively. There are a whole range of benefits to cloud computing for businesses, but there are also a number of risks that companies need to be aware of. Ignoring th... Read more
- April 7, 2017
Migration to the Cloud – Making it Easy
With more and more chambers and law firms moving their data to the cloud, many are looking for the quickest and safest ways to follow suit. Migration to the cloud need not be an arduous and pain-staking process. However, there are a number of common mistakes that many organisations make durin... Read more
- March 24, 2017
Cloud Based Encryption – A Guide
A rising number of organisations are making the move to cloud-based storage, and for good reason. The benefits are manifold and include access to data from any location, access from numerous devices, specialist support and backup, alongside constant updates and improvements to the system, to ... Read more
- March 17, 2017
IT Security And APIs – What Does The Future Hold?
APIs (or Application Programming Interfaces) are a fundamental part of how modern technology works with deep significance for IT security. In basic terms, they are a set of protocols that govern how one application (i.e. piece of software) talks to other applications. APIs allow programs to s... Read more
- March 10, 2017
The Biggest Cyber Crime Threats Facing Law Firms
Cyber crime threats are ever-changing and ever-increasing. With the amount of private and sensitive information stored by law firms, its little surprise that all law firms are being encouraged to take cyber crime threats more seriously. In fact, there has been a 20% increase in attacks on UK ... Read more
- March 3, 2017
The Cyber Curriculum – Addressing the Need for More Cyber Security Talent
The UK is in the grip of a cyber security skills shortage, with companies needing far more cyber security professionals than there are people interested in filling those positions. This is a particular issue, especially in light of the significant number of high profile cyber security inciden... Read more
- February 24, 2017
Big Data – Why It Matters For Your Business
When we talk about “big data” what do we mean? For businesses, big data is about taking large amounts of information and using the latest techniques to analyse that data, identify trends and patterns, then use what you have learned to guide your future business strategy. This is an increasingly ... Read more
- February 17, 2017
4 Reasons Your Law Firm Should Move To The Cloud
The idea of cloud computing is gaining ever more traction in the world of business, with an increasing number of companies seeing the advantages of investing in a move to the cloud through shifting their data and other key resources online. Most business owners are now aware of what cloud com... Read more
- February 10, 2017
5 Best Legal Tech Apps
Apps are everywhere, on our phones, tablets, laptops and desktops, having become an essential part of our daily lives. They are also increasingly popular for business purposes, with many apps helping to streamline existing tasks and others opening up whole new ways of working. The legal indus... Read more
- February 3, 2017
Law Firms And Cyber Crime – Why Hacking Is Becoming More Creative
Hackers are becoming ever more creative, both in their techniques and their choices of victims, with law firms now in the firing line. Their target is most often confidential client information which can be highly valuable to hackers while the loss can be hugely damaging both to clients and to law f... Read more
- January 27, 2017
Cybersecurity For UK Lawyers: The Basics
Cybersecurity is a growing concern for most modern businesses, with 2016 having seen a series of very high profile incidents which show just how much power hackers can have if not properly protected against. This should be especially concerning for industries, such as the legal profession, where fir... Read more
- January 20, 2017
Internet Security – Making It A Priority In 2017
2016 saw a number of high profile incidents of hacking, cyber attacks and other internet security breaches. These include the politically sensitive hacking of the US Democratic National Convention and a large scale digital denial of service (DDOS) attack which temporarily took down major inte... Read more
- January 13, 2017
The Advantages Of Cloud Security
The use of cloud-based storage has increased hugely for both business and personal use over the past few years and 2017 is set to see this usage growing even further. As a result, cloud security must also improve. While improvements in any area of cybersecurity are always needed through conti... Read more
- January 6, 2017
Machine Learning – The Impact On The Cloud
Modern business is becoming ever more data driven with customers and companies generating large amounts of information all the time. Being able to successfully analyse and draw insights from this data can help businesses work more effectively and efficiently. Many companies could benefit from... Read more
- December 22, 2016
Cybersecurity Skills Gap: What Does It Mean For Your Chambers?
1 in 4 IT professionals say a lack of skilled cybersecurity workers is responsible for cyber theft affecting their businesses. It is estimated that as many as 15% of all cybersecurity jobs will go unfilled by 2020, leaving a significant hole in many businesses’ IT security strategies. Finding ways... Read more
- December 16, 2016
The Future Of Cybersecurity – What Can We Expect In 2017?
2016 saw a number of high profile incidents of cyber crime, including the hacking of the Democratic party during the US Presidential Election and a major DDoS attack which managed to shut down key services including Netflix, Amazon and CNN. With 1 in 5 businesses suffering data loss in the last year... Read more
- December 9, 2016
The Internet of Things and Cyber Security
According to some predictions, there will be as many as 34 billion devices globally connected to the internet by 2020. Of these, more than two-thirds are expected to be part of the Internet of Things (IOT). The Internet of Things has many advantages, such as letting you control you home heati... Read more
- December 2, 2016
Tesco Bank Cyber Attack – What Can We Learn?
In early November, Tesco was the victim of a cyber attack in which over £2.5million was stolen from approximately 9,000 of its customers’ accounts. As a result, Tesco has been forced to repay the stolen money to its customers and is now working with the National Crime Agency and other auth... Read more
- November 24, 2016
‘Foreign Actors’ – The Threat to UK Cybersecurity
Cyber security threats are increasing day by day, and it is not just individuals and businesses that are being threatened. With improvements in technology and access to the internet, and with more and more information being stored electronically, so-called ‘foreign actors’ are finding new... Read more
- November 18, 2016
VOIP Security – Is Acoustic Eavesdropping a Concern?
When you are using VOIP to speak to clients and co-workers, do you ever worry that hackers could be using those calls to steal critical data, including usernames and passwords? Incredible as it might seem, recent research shows that it is now possible for hackers to break into your VOIP calls... Read more
- November 10, 2016
Remote Working – Is Your Company Data Still Safe?
Remote working offers a number of advantages for businesses and their employees, but it also brings potential risks for data security. While the flexibility to work from home, clients’ offices or any other location with an internet connection provides a lot of freedom, companies have to tak... Read more
- October 28, 2016
Do You Suffer from Cyber Security Fatigue?
It is easy to become overwhelmed with the number of cyber security warnings we are faced with on a day to day basis. There is an increasing requirement to remember more passwords, go through more barriers to access our own information and keep up to date with software updates and reports of l... Read more
- October 21, 2016
Staff Training – The Best Type of Cyber Security?
“There is no patch for careless, greedy or stupid” according to FBI Computer Intrusion Head Don Codling. He is referring to the growing problem of cyber crime across the world and the knowledge that many of the attacks that occur are initiated to some extent by internal users. Cyber Sec... Read more
- October 13, 2016
Pippa Middleton iCloud Hacking – Should You Be Worried?
“41% of employees use cloud storage at least once a week, while 50% use personal equipment to access work information and services at least once a week.” Apple’s iCloud is one of the most useful personal data storage and backup tools available to us today. Apple’... Read more
- October 7, 2016
Smartphone Security in the Workplace – Are they Secure?
Smartphones have become like an extra limb for a huge majority of us – particularly the younger generation. They are often the first thing we check in the morning and the last thing we look at at night. It is quite shocking to think about the amount of information we store in our phones... Read more
- September 30, 2016
Social Media and Cyber Security – What Are the Risks?
Social media is a fantastic tool used by businesses in every sector. It provides the perfect opportunity for advertising, networking, and increased customer service and interaction. Online arenas such as Facebook, Instagram, Twitter and YouTube are excellent forums for attracting custo... Read more
- September 23, 2016
Types of Cyber Security Breaches – What are the Most Common?
“24% of all businesses have experienced one or more cyber security breaches in the last 12 months.” www.gov.uk Today’s businesses rely very much on the internet to carry out day-to-day tasks and store vast amounts of their information. This makes the threat of cyber attacks ... Read more
- September 16, 2016
Will Removing Passwords Make our Data Safer?
“Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.” – MIT Information Systems and Technology (Top Ten... Read more
- September 9, 2016
Can You Protect Against an Internal Data Security Breach?
Within the last 12 months, a huge number of businesses have fallen victim to an internal security breach. These have included high profile organisations as Sage Group, whose payroll processing software is estimated to be used by more than half of Britain’s businesses. Talk Talk and Morrisons f... Read more
- September 2, 2016
The Cyber Power Index – How Does the UK Fare?
“Cyber power is created when a complex digital information network is combined with a secure and robust physical infrastructure and developed by a skilled workforce.” computing.co.uk The Cyber Power Index, as developed by the Economist Intelligence Unit, demonstrates a country’s ab... Read more
- August 24, 2016
The IT Security Skills Gap – Don’t Let it Impact Your Business
There’s been talk of an IT skills shortage for years, but it’s beginning to get serious. The majority of UK CIOs – a huge 77% – are convinced that the high number of expected security threats is down to a shortage of security experts. Data breaches and abuse top the “worst fears” lis... Read more
- August 16, 2016
Cyber Security ROI – Can You Put a Price on IT Security?
Cyber security measures are invaluable. However, the return on investment (ROI) doesn’t always communicate this. In fact, even IT security experts have difficulty measuring the ROI of their product. A survey run by the Infosecurity Europe 2016 summit revealed that the majority of cybersecurity pro... Read more
- August 2, 2016
IT Support: Why There’s Never Been a Better Time to Outsource
The Problem Computer support and development is an ever-changing, ever-complicating beast. It’s a vital part of any business, but also a part that many managers would prefer not to think about; hence the position of Chief Information Officer (CIO). However, the amount your average CI... Read more
- July 28, 2016
How Will #Brexit Impact UK Cybersecurity?
Historically we have seen cybercrime rise after large natural disasters and events impacting world economy; Brexit qualifies for the latter. – Cyphort chief strategy officer Dr Fengmin Gong. Is UK Cybersecurity in Danger Post-Brexit? It’s taken a few weeks post-Brexit for many to reme... Read more
- July 15, 2016
The Future of Cybersecurity
“Data…is transforming every profession and industry…cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.” IBM Chairperson and CEO Ginni Romelty The future of cybersecurity belongs to us all. Our futures and those of genera... Read more
- July 8, 2016
Why Cyber Security Should be on a Par With Physical Security
When the term “high security” comes to mind, you probably think of a mile-high fence encasing endless corridors of locked doors. You wouldn’t be wrong; information is always stored in a way designed to keep the wrong people out, whether it’s in a datacentre or a law firm. Networks and databa... Read more
- July 1, 2016
SMEs Failing to Recognise Cybersecurity Threats
Last year, a member of staff at Blackburn-based vehicle hire company MNH Platinum clicked an email link. The link opened a virus that encrypted more than 12,000 files on the company’s network. Soon after came a message – pay the attacker £3,000 or lose the files forever. MNH Platinum was lu... Read more
- June 17, 2016
New Website Makes it Easier to Find A Barrister
Earlier this year, The Bar Council launched a brand new website which is designed to help members of the public gain access to a definitive list of barristers who they can hire for legal representation. The Direct Access Portal (DAP) gives consumers the opportunity to find a barrister directly, whi... Read more
- June 9, 2016
How Will The IT Security Skills Shortage Impact UK Businesses?
“An alarming 86% of business and IT professionals globally believe there is a shortage of cyber security professionals” – according to the ISACA 2015 Global Security Status Report. A digital skills gap exists across the entire technology industry within the UK. There is a huge dispa... Read more
- May 26, 2016
How To Survive A Data Breach
Data breaches within any type of organisation range from being simply an annoyance to the catastrophic kind that threaten a company’s reputation and finances. In the legal industry, there are also compliance regulations to satisfy and a data breach in the IT systems of Chambers can cost a penalty ... Read more