CBS Intelligence Centre

  • Security as a ServiceAugust 8, 2017

    Security as a Service – The Benefits For Cybersecurity

      On a day-to-day basis, cyber security is having to change and develop to match ever-changing cyber threats. It is something that all businesses, big and small, have to deal with, and it is constantly adding pressure to business leaders and managers. Security as a service can take the pressure... Read more
  • GDPR RisksJuly 28, 2017

    GDPR – What Are The Risks To Business?

      The General Data Protection Regulation has been causing a bit of tension lately, with many businesses concerned about how they will meet the new requirements. Many are also concerned about the potential GDPR risks to businesses. We’ve already outlined the requirements for meeting the b... Read more
  • IT Priorities for chambersJuly 21, 2017

    IT Priorities – Where Should Your Chambers Be Focusing?

    Keeping on top of all the IT requirements of legal chambers can be challenging and time-consuming, particularly with the introduction of the General Data Protection Regulation due to come into force in May 2018. It may seem like all of your attention has been set on preparing for GDPR, checking yo... Read more
  • legal softwareJuly 14, 2017

    Legal Software – Our Guide

      Managing a law firm and all the business aspects that go along with it can be challenging. In this digital era we are now living in, one of the best ways to simplify the day to day management of your law firm is through the introduction of software systems. These have so many benefits includi... Read more
  • Cyber Security and WomenJuly 7, 2017

    Cyber Security And Women – How Is The Future Looking?

      Female IT professionals are few and far between. Statistics show that globally, just 10% of IT professionals are women, while in Europe that number drops to just 7%. Numbers of women in cyber security and other areas of IT are continuing to drop in spite of the UK government’s attempts ... Read more
  • Preparing for GDPRJune 23, 2017

    Preparing for GDPR – Is The UK Ready?

      Preparing for GDPR is going to be one of the most important changes your law firm puts into place over the next year, but how ready are you? Although the process need not be taxing with the right help and guidance, some organisations are still struggling to meet the bar. In fact, according to... Read more
  • IT Backup RoutinesJune 16, 2017

    IT Backup Routines – Why They Are So Important

      Backing up your data is a fundamental part of using information technology. Whether you are a student backing up essays and assignments, or a lawyer in a law firm, all technology has the potential to fail you once in a while. However, when your business depends on it, an IT failure can be dis... Read more
  • boost cyber securityJune 9, 2017

    6 Sure Fire Ways To Boost Your Cyber Security

      Cyber security is a subject which should always be a foremost concern for any business, but with recent events such as the large-scale NHS hack – part of a global attack – it is no wonder many businesses are looking to boost cyber security in whatever way they can. Hackers are alw... Read more
  • GDPR for lawyersJune 2, 2017

    General Data Protection Regulation for Lawyers

      The General Data Protection Regulation (GDPR) is a new EU regulation which replaces the UK’s Data Protection Act 1998. For any type of organisation dealing with individuals’ personal data, there are a number of changes which will need to be taken into account. When considering GDP... Read more
  • Perimeter SecurityMay 25, 2017

    Perimeter Security – What You Need To Know

      Perimeter security is the first point of defence in any computer network. Its purpose is to ensure that only those who are authorised can access an organisation’s computer network. Within the perimeter, you must then have secondary lines of defence which protect specific items, document... Read more
  • Blockchain and cybersecurityMay 19, 2017

    Blockchain and Cybersecurity – A Beginner’s Guide

      We are constantly reminded of the threats posed by malicious outside agencies to our private and corporate data. Cyber security attacks occur daily, and those developing the technology to carry out attacks are sometimes able to evolve quicker than the average organisation’s security fea... Read more
  • Malware for lawyersMay 12, 2017

    Malware – A Guide For Lawyers

      Nearly 40% of businesses have been attacked by ransomware, one of the most common types of malware, according to recent research. This shows just how serious the threat is to modern businesses from the rise in malware and, unfortunately, law firms are no exception. Although malware is a probl... Read more
  • GDPR ComplianceMay 5, 2017

    GDPR Compliance – What Is Involved?

      From 25th May 2018, the new EU GDPR legislation will affect all organisations that process the data of individual EU residents. Although the UK is poised to be leaving the EU in the aftermath of the Brexit vote, the government and the ICO have confirmed that the General Data Protection Regula... Read more
  • general data protection regulationApril 28, 2017

    General Data Protection Regulation: Are You Ready?

      Recent research conducted by Veritas has confirmed that 54% of organisations have yet to prepare themselves for the commencement of the EU’s new General Data Protection Regulation policy, which will come into effect in May 2018. Perhaps this is due to a misunderstanding regarding the UK’s... Read more
  • improve business IT performanceApril 21, 2017

    5 Hassle-Free Ways To Improve Business IT Performance

      In comparison to how we conducted business a decade or so ago, technology is now at the forefront of business innovation. Companies are in an ongoing race to adapt with the times and utilise the best digital services and products that are on the market, in order to push their organisation to ... Read more
  • Cloud security failureApril 13, 2017

    Cloud Security Failure – 4 Ways to Avoid It

      Cloud-computing is revolutionising the way businesses work, making it easier to access and share resources flexibly and cost-effectively. There are a whole range of benefits to cloud computing for businesses, but there are also a number of risks that companies need to be aware of. Ignoring th... Read more
  • migration to the cloudApril 7, 2017

    Migration to the Cloud – Making it Easy

      With more and more chambers and law firms moving their data to the cloud, many are looking for the quickest and safest ways to follow suit. Migration to the cloud need not be an arduous and pain-staking process. However, there are a number of common mistakes that many organisations make durin... Read more
  • cloud based encryptionMarch 24, 2017

    Cloud Based Encryption – A Guide

      A rising number of organisations are making the move to cloud-based storage, and for good reason. The benefits are manifold and include access to data from any location, access from numerous devices, specialist support and backup, alongside constant updates and improvements to the system, to ... Read more
  • IT security and APIsMarch 17, 2017

    IT Security And APIs – What Does The Future Hold?

      APIs (or Application Programming Interfaces) are a fundamental part of how modern technology works with deep significance for IT security. In basic terms, they are a set of protocols that govern how one application (i.e. piece of software) talks to other applications. APIs allow programs to s... Read more
  • March 10, 2017

    The Biggest Cyber Crime Threats Facing Law Firms

      Cyber crime threats are ever-changing and ever-increasing. With the amount of private and sensitive information stored by law firms, its little surprise that all law firms are being encouraged to take cyber crime threats more seriously. In fact, there has been a 20% increase in attacks on UK ... Read more
  • Cyber curriculumMarch 3, 2017

    The Cyber Curriculum – Addressing the Need for More Cyber Security Talent

      The UK is in the grip of a cyber security skills shortage, with companies needing far more cyber security professionals than there are people interested in filling those positions. This is a particular issue, especially in light of the significant number of high profile cyber security inciden... Read more
  • Big dataFebruary 24, 2017

    Big Data – Why It Matters For Your Business

    When we talk about “big data” what do we mean? For businesses, big data is about taking large amounts of information and using the latest techniques to analyse that data, identify trends and patterns, then use what you have learned to guide your future business strategy. This is an increasingly ... Read more
  • Move to the cloudFebruary 17, 2017

    4 Reasons Your Law Firm Should Move To The Cloud

      The idea of cloud computing is gaining ever more traction in the world of business, with an increasing number of companies seeing the advantages of investing in a move to the cloud through shifting their data and other key resources online. Most business owners are now aware of what cloud com... Read more
  • Best legal tech appsFebruary 10, 2017

    5 Best Legal Tech Apps

      Apps are everywhere, on our phones, tablets, laptops and desktops, having become an essential part of our daily lives. They are also increasingly popular for business purposes, with many apps helping to streamline existing tasks and others opening up whole new ways of working. The legal indus... Read more
  • law firms and cyber crimeFebruary 3, 2017

    Law Firms And Cyber Crime – Why Hacking Is Becoming More Creative

    Hackers are becoming ever more creative, both in their techniques and their choices of victims, with law firms now in the firing line. Their target is most often confidential client information which can be highly valuable to hackers while the loss can be hugely damaging both to clients and to law f... Read more
  • Cybersecurity for UK LawyersJanuary 27, 2017

    Cybersecurity For UK Lawyers: The Basics

    Cybersecurity is a growing concern for most modern businesses, with 2016 having seen a series of very high profile incidents which show just how much power hackers can have if not properly protected against. This should be especially concerning for industries, such as the legal profession, where fir... Read more
  • internet securityJanuary 20, 2017

    Internet Security – Making It A Priority In 2017

      2016 saw a number of high profile incidents of hacking, cyber attacks and other internet security breaches. These include the politically sensitive hacking of the US Democratic National Convention and a large scale digital denial of service (DDOS) attack which temporarily took down major inte... Read more
  • advantages of cloud securityJanuary 13, 2017

    The Advantages Of Cloud Security

      The use of cloud-based storage has increased hugely for both business and personal use over the past few years and 2017 is set to see this usage growing even further. As a result, cloud security must also improve. While improvements in any area of cybersecurity are always needed through conti... Read more
  • machine learningJanuary 6, 2017

    Machine Learning – The Impact On The Cloud

      Modern business is becoming ever more data driven with customers and companies generating large amounts of information all the time. Being able to successfully analyse and draw insights from this data can help businesses work more effectively and efficiently. Many companies could benefit from... Read more
  • cybersecurity skills gapDecember 22, 2016

    Cybersecurity Skills Gap: What Does It Mean For Your Chambers?

    1 in 4 IT professionals say a lack of skilled cybersecurity workers is responsible for cyber theft affecting their businesses. It is estimated that as many as 15% of all cybersecurity jobs will go unfilled by 2020, leaving a significant hole in many businesses’ IT security strategies. Finding ways... Read more
  • future of cybersecurityDecember 16, 2016

    The Future Of Cybersecurity – What Can We Expect In 2017?

    2016 saw a number of high profile incidents of cyber crime, including the hacking of the Democratic party during the US Presidential Election and a major DDoS attack which managed to shut down key services including Netflix, Amazon and CNN. With 1 in 5 businesses suffering data loss in the last year... Read more
  • internet of thingsDecember 9, 2016

    The Internet of Things and Cyber Security

      According to some predictions, there will be as many as 34 billion devices globally connected to the internet by 2020. Of these, more than two-thirds are expected to be part of the Internet of Things (IOT). The Internet of Things has many advantages, such as letting you control you home heati... Read more
  • December 2, 2016

    Tesco Bank Cyber Attack – What Can We Learn?

      In early November, Tesco was the victim of a cyber attack in which over £2.5million was stolen from approximately 9,000 of its customers’ accounts. As a result, Tesco has been forced to repay the stolen money to its customers and is now working with the National Crime Agency and other auth... Read more
  • foreign actorsNovember 24, 2016

    ‘Foreign Actors’ – The Threat to UK Cybersecurity

      Cyber security threats are increasing day by day, and it is not just individuals and businesses that are being threatened. With improvements in technology and access to the internet, and with more and more information being stored electronically, so-called ‘foreign actors’ are finding new... Read more
  • November 18, 2016

    VOIP Security – Is Acoustic Eavesdropping a Concern?

      When you are using VOIP to speak to clients and co-workers, do you ever worry that hackers could be using those calls to steal critical data, including usernames and passwords? Incredible as it might seem, recent research shows that it is now possible for hackers to break into your VOIP calls... Read more
  • Remote workingNovember 10, 2016

    Remote Working – Is Your Company Data Still Safe?

      Remote working offers a number of advantages for businesses and their employees, but it also brings potential risks for data security. While the flexibility to work from home, clients’ offices or any other location with an internet connection provides a lot of freedom, companies have to tak... Read more
  • Cyber Security FatigueOctober 28, 2016

    Do You Suffer from Cyber Security Fatigue?

      It is easy to become overwhelmed with the number of cyber security warnings we are faced with on a day to day basis. There is an increasing requirement to remember more passwords, go through more barriers to access our own information and keep up to date with software updates and reports of l... Read more
  • cyber attacksOctober 21, 2016

    Staff Training – The Best Type of Cyber Security?

    “There is no patch for careless, greedy or stupid” ­according to FBI Computer Intrusion Head Don Codling. He is referring to the growing problem of cyber crime across the world and the knowledge that many of the attacks that occur are initiated to some extent by internal users.   Cyber Sec... Read more
  • iCloud HackingOctober 13, 2016

    Pippa Middleton iCloud Hacking – Should You Be Worried?

      “41% of employees use cloud storage at least once a week, while 50% use personal equipment to access work information and services at least once a week.”   Apple’s iCloud is one of the most useful personal data storage and backup tools available to us today. Apple’... Read more
  • smartphone securityOctober 7, 2016

    Smartphone Security in the Workplace – Are they Secure?

      Smartphones have become like an extra limb for a huge majority of us – particularly the younger generation. They are often the first thing we check in the morning and the last thing we look at at night. It is quite shocking to think about the amount of information we store in our phones... Read more
  • September 30, 2016

    Social Media and Cyber Security – What Are the Risks?

        Social media is a fantastic tool used by businesses in every sector. It provides the perfect opportunity for advertising, networking, and increased customer service and interaction. Online arenas such as Facebook, Instagram, Twitter and YouTube are excellent forums for attracting custo... Read more
  • types of cyber security breachesSeptember 23, 2016

    Types of Cyber Security Breaches – What are the Most Common?

      “24% of all businesses have experienced one or more cyber security breaches in the last 12 months.” Today’s businesses rely very much on the internet to carry out day-to-day tasks and store vast amounts of their information. This makes the threat of cyber attacks ... Read more
  • removing passwordsSeptember 16, 2016

    Will Removing Passwords Make our Data Safer?

    “Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.” – MIT Information Systems and Technology (Top Ten... Read more
  • internal data security breachSeptember 9, 2016

    Can You Protect Against an Internal Data Security Breach?

    Within the last 12 months, a huge number of businesses have fallen victim to an internal security breach. These have included high profile organisations as Sage Group, whose payroll processing software is estimated to be used by more than half of Britain’s businesses. Talk Talk and Morrisons f... Read more
  • September 2, 2016

    The Cyber Power Index – How Does the UK Fare?

    “Cyber power is created when a complex digital information network is combined with a secure and robust physical infrastructure and developed by a skilled workforce.” The Cyber Power Index, as developed by the Economist Intelligence Unit, demonstrates a country’s ab... Read more
  • IT Security Skills GapAugust 24, 2016

    The IT Security Skills Gap – Don’t Let it Impact Your Business

    There’s been talk of an IT skills shortage for years, but it’s beginning to get serious. The majority of UK CIOs – a huge 77% – are convinced that the high number of expected security threats is down to a shortage of security experts. Data breaches and abuse top the “worst fears” lis... Read more
  • cyber security roiAugust 16, 2016

    Cyber Security ROI – Can You Put a Price on IT Security?

    Cyber security measures are invaluable. However, the return on investment (ROI) doesn’t always communicate this. In fact, even IT security experts have difficulty measuring the ROI of their product. A survey run by the Infosecurity Europe 2016 summit revealed that the majority of cybersecurity pro... Read more
  • outsourcing IT supportAugust 2, 2016

    IT Support: Why There’s Never Been a Better Time to Outsource

      The Problem   Computer support and development is an ever-changing, ever-complicating beast. It’s a vital part of any business, but also a part that many managers would prefer not to think about; hence the position of Chief Information Officer (CIO). However, the amount your average CI... Read more
  • Brexit impact on cybersecurityJuly 28, 2016

    How Will #Brexit Impact UK Cybersecurity?

    Historically we have seen cybercrime rise after large natural disasters and events impacting world economy; Brexit qualifies for the latter. – Cyphort chief strategy officer Dr Fengmin Gong. Is UK Cybersecurity in Danger Post-Brexit?   It’s taken a few weeks post-Brexit for many to reme... Read more
  • cybersecurityJuly 15, 2016

    The Future of Cybersecurity

    “Data…is transforming every profession and industry…cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.” IBM Chairperson and CEO Ginni Romelty The future of cybersecurity belongs to us all. Our futures and those of genera... Read more