CBS Intelligence Centre
- February 23, 2018
The Impact of GDPR – What Can We Expect?
With the deadline of the General Data Protection Regulation (GDPR) fast approaching, it’s a hot topic of conversation for businesses. GDPR is set to affect both the way in which businesses utilise and store client data, as well as help tighten up online security. But beyond this, many ... Read more
- February 14, 2018
Cloud Environments – What Are The Options?
Technological advancements are consistently changing the ways in which businesses function; with many companies employing remote workers or having employees that need to access documents when out of office. Cloud environments are fast becoming the option of choice for businesses to function... Read more
- January 30, 2018
Cyber Security Certification – A Guide
With cyber security becoming more and more central to the day to day running of every type of organisation, skilled cyber security professionals are in very high demand. Threats to cyber security on both a local and an international scale are growing daily, so more and more professionals are... Read more
- January 18, 2018
Computer Chip Flaws: What You Need To Know
As we know, computer hackers work daily to develop new advanced programmes and software in order to attack our data systems and devices, including our mobile phones. Every day, nearly one million new malware threats are released which could potentially harm our digital networks. Despite the... Read more
- December 22, 2017
IT Trends 2018 – What’s On The Horizon?
IT is an ever-growing, ever-changing, ever-evolving sector, and as we leave 2017 behind us and jump into the unknown of 2018, what might we expect when it comes to IT trends? What is going to help us over the next 12 months when it comes to cloud networking, security, and connectivity? ... Read more
- December 7, 2017
The Cloud Hybrid – What Difference Can It Make For Businesses?
Over the past few years, use of cloud-based IT services has increased hugely amongst businesses worldwide. In fact, use of the cloud has become an everyday part of life for most businesses, with around 90% of organisations utilising some sort of cloud-based service. The benefits of using cloud stor... Read more
- November 22, 2017
Organisational Perspective – The Effects On GDPR
The looming implementation of GDPR is forcing many companies to rethink how they approach the organisational strategy of their business. With the high level of planning and new ways of working that are needing to be implemented by many businesses since the announcement of GDPR, this is not su... Read more
- November 9, 2017
Cyber Security Defences – More Important Than Ever
There is no doubt that every day technology is expanding and improving. Twenty years ago, the idea of the iPhone, which we now hold in the palm of our hand, would have seemed unfathomable against the chunky desktop computer and dial-up modem we were so used to. But with every positive and pro... Read more
- October 26, 2017
GDPR and SaaS – What You Need to Know
The EU’s General Data Protection Regulation (GDPR) has been a central concern to all UK businesses working with data over the past few months, and the pressure is unlikely to lessen as the year comes to an end. In just 9 months time, any businesses dealing with data concerning an EU cit... Read more
- October 12, 2017
Migrating To The Cloud – Is Strategy Important?
Developing a strategy is a central aspect of almost any business process, and migrating to the cloud requires much the same planning and consideration. Cloud services are becoming more and more popular by the day, and there is little doubt that it can be hugely beneficial to any business. How... Read more
- September 28, 2017
Leaving The EU – What Might It Mean For Cyber Security?
The EU has put a significant amount of emphasis on cyber and data security in recent years. Perhaps the most prominent recent example is the soon-to-be-implemented General Data Protection Regulation. This is one EU cyber security regulation that the UK will be holding on to even after Brexit... Read more
- September 14, 2017
Biometric Identification – The Next Level of Cyber Security?
Bolstering your cyber security is something all IT professionals put immense value on, particularly with the news brimming with stories of high-profile cyber attacks. Legal chambers are particularly vulnerable. Hackers value information that can be bought and sold for financial gain, and a ... Read more
- August 31, 2017
Meeting GDPR – How To Approach Your Data
Meeting GDPR may seem challenging with the deadline of May 2018 less than a year away. However, it’s important to remember that the new regulation, though stressful in its implementation, is there to protect both your clients and your business, so careful planning and consideration is... Read more
- August 24, 2017
Tech Strategy for Chambers – 5 Essential Elements
A tech strategy for chambers is something that requires regular review, and now is as good a time as any to consider what you currently have in place. In the coming year, businesses will need to implement a new GDPR strategy, and there is every chance that the UK will be increasing the fines for c... Read more
- August 15, 2017
Artificial Intelligence – The Future of Cyber Security?
Cyber security threats are ever-changing and ever-evolving, with experts constantly working to evolve their security methods at an equal or, preferably, faster rate. Their job is to stay ahead of the game. With the changes to how we work and manage our networks – including the addition of clo... Read more
- August 8, 2017
Security as a Service – The Benefits For Cybersecurity
On a day-to-day basis, cyber security is having to change and develop to match ever-changing cyber threats. It is something that all businesses, big and small, have to deal with, and it is constantly adding pressure to business leaders and managers. Security as a service can take the pressure... Read more
- July 28, 2017
GDPR – What Are The Risks To Business?
The General Data Protection Regulation has been causing a bit of tension lately, with many businesses concerned about how they will meet the new requirements. Many are also concerned about the potential GDPR risks to businesses. We’ve already outlined the requirements for meeting the b... Read more
- July 21, 2017
IT Priorities – Where Should Your Chambers Be Focusing?
Keeping on top of all the IT requirements of legal chambers can be challenging and time-consuming, particularly with the introduction of the General Data Protection Regulation due to come into force in May 2018. It may seem like all of your attention has been set on preparing for GDPR, checking yo... Read more
- July 14, 2017
Legal Software – Our Guide
Managing a law firm and all the business aspects that go along with it can be challenging. In this digital era we are now living in, one of the best ways to simplify the day to day management of your law firm is through the introduction of software systems. These have so many benefits includi... Read more
- July 7, 2017
Cyber Security And Women – How Is The Future Looking?
Female IT professionals are few and far between. Statistics show that globally, just 10% of IT professionals are women, while in Europe that number drops to just 7%. Numbers of women in cyber security and other areas of IT are continuing to drop in spite of the UK government’s attempts ... Read more
- June 23, 2017
Preparing for GDPR – Is The UK Ready?
Preparing for GDPR is going to be one of the most important changes your law firm puts into place over the next year, but how ready are you? Although the process need not be taxing with the right help and guidance, some organisations are still struggling to meet the bar. In fact, according to... Read more
- June 16, 2017
IT Backup Routines – Why They Are So Important
Backing up your data is a fundamental part of using information technology. Whether you are a student backing up essays and assignments, or a lawyer in a law firm, all technology has the potential to fail you once in a while. However, when your business depends on it, an IT failure can be dis... Read more
- June 9, 2017
6 Sure Fire Ways To Boost Your Cyber Security
Cyber security is a subject which should always be a foremost concern for any business, but with recent events such as the large-scale NHS hack – part of a global attack – it is no wonder many businesses are looking to boost cyber security in whatever way they can. Hackers are alw... Read more
- June 2, 2017
General Data Protection Regulation for Lawyers
The General Data Protection Regulation (GDPR) is a new EU regulation which replaces the UK’s Data Protection Act 1998. For any type of organisation dealing with individuals’ personal data, there are a number of changes which will need to be taken into account. When considering GDP... Read more
- May 25, 2017
Perimeter Security – What You Need To Know
Perimeter security is the first point of defence in any computer network. Its purpose is to ensure that only those who are authorised can access an organisation’s computer network. Within the perimeter, you must then have secondary lines of defence which protect specific items, document... Read more
- May 19, 2017
Blockchain and Cybersecurity – A Beginner’s Guide
We are constantly reminded of the threats posed by malicious outside agencies to our private and corporate data. Cyber security attacks occur daily, and those developing the technology to carry out attacks are sometimes able to evolve quicker than the average organisation’s security fea... Read more
- May 12, 2017
Malware – A Guide For Lawyers
Nearly 40% of businesses have been attacked by ransomware, one of the most common types of malware, according to recent research. This shows just how serious the threat is to modern businesses from the rise in malware and, unfortunately, law firms are no exception. Although malware is a probl... Read more
- May 5, 2017
GDPR Compliance – What Is Involved?
From 25th May 2018, the new EU GDPR legislation will affect all organisations that process the data of individual EU residents. Although the UK is poised to be leaving the EU in the aftermath of the Brexit vote, the government and the ICO have confirmed that the General Data Protection Regula... Read more
- April 28, 2017
General Data Protection Regulation: Are You Ready?
Recent research conducted by Veritas has confirmed that 54% of organisations have yet to prepare themselves for the commencement of the EU’s new General Data Protection Regulation policy, which will come into effect in May 2018. Perhaps this is due to a misunderstanding regarding the UK’s... Read more
- April 21, 2017
5 Hassle-Free Ways To Improve Business IT Performance
In comparison to how we conducted business a decade or so ago, technology is now at the forefront of business innovation. Companies are in an ongoing race to adapt with the times and utilise the best digital services and products that are on the market, in order to push their organisation to ... Read more
- April 13, 2017
Cloud Security Failure – 4 Ways to Avoid It
Cloud-computing is revolutionising the way businesses work, making it easier to access and share resources flexibly and cost-effectively. There are a whole range of benefits to cloud computing for businesses, but there are also a number of risks that companies need to be aware of. Ignoring th... Read more
- April 7, 2017
Migration to the Cloud – Making it Easy
With more and more chambers and law firms moving their data to the cloud, many are looking for the quickest and safest ways to follow suit. Migration to the cloud need not be an arduous and pain-staking process. However, there are a number of common mistakes that many organisations make durin... Read more
- March 24, 2017
Cloud Based Encryption – A Guide
A rising number of organisations are making the move to cloud-based storage, and for good reason. The benefits are manifold and include access to data from any location, access from numerous devices, specialist support and backup, alongside constant updates and improvements to the system, to ... Read more
- March 17, 2017
IT Security And APIs – What Does The Future Hold?
APIs (or Application Programming Interfaces) are a fundamental part of how modern technology works with deep significance for IT security. In basic terms, they are a set of protocols that govern how one application (i.e. piece of software) talks to other applications. APIs allow programs to s... Read more
- March 10, 2017
The Biggest Cyber Crime Threats Facing Law Firms
Cyber crime threats are ever-changing and ever-increasing. With the amount of private and sensitive information stored by law firms, its little surprise that all law firms are being encouraged to take cyber crime threats more seriously. In fact, there has been a 20% increase in attacks on UK ... Read more
- March 3, 2017
The Cyber Curriculum – Addressing the Need for More Cyber Security Talent
The UK is in the grip of a cyber security skills shortage, with companies needing far more cyber security professionals than there are people interested in filling those positions. This is a particular issue, especially in light of the significant number of high profile cyber security inciden... Read more
- February 24, 2017
Big Data – Why It Matters For Your Business
When we talk about “big data” what do we mean? For businesses, big data is about taking large amounts of information and using the latest techniques to analyse that data, identify trends and patterns, then use what you have learned to guide your future business strategy. This is an increasingly ... Read more
- February 17, 2017
4 Reasons Your Law Firm Should Move To The Cloud
The idea of cloud computing is gaining ever more traction in the world of business, with an increasing number of companies seeing the advantages of investing in a move to the cloud through shifting their data and other key resources online. Most business owners are now aware of what cloud com... Read more
- February 10, 2017
5 Best Legal Tech Apps
Apps are everywhere, on our phones, tablets, laptops and desktops, having become an essential part of our daily lives. They are also increasingly popular for business purposes, with many apps helping to streamline existing tasks and others opening up whole new ways of working. The legal indus... Read more
- February 3, 2017
Law Firms And Cyber Crime – Why Hacking Is Becoming More Creative
Hackers are becoming ever more creative, both in their techniques and their choices of victims, with law firms now in the firing line. Their target is most often confidential client information which can be highly valuable to hackers while the loss can be hugely damaging both to clients and to law f... Read more
- January 27, 2017
Cybersecurity For UK Lawyers: The Basics
Cybersecurity is a growing concern for most modern businesses, with 2016 having seen a series of very high profile incidents which show just how much power hackers can have if not properly protected against. This should be especially concerning for industries, such as the legal profession, where fir... Read more
- January 20, 2017
Internet Security – Making It A Priority In 2017
2016 saw a number of high profile incidents of hacking, cyber attacks and other internet security breaches. These include the politically sensitive hacking of the US Democratic National Convention and a large scale digital denial of service (DDOS) attack which temporarily took down major inte... Read more
- January 13, 2017
The Advantages Of Cloud Security
The use of cloud-based storage has increased hugely for both business and personal use over the past few years and 2017 is set to see this usage growing even further. As a result, cloud security must also improve. While improvements in any area of cybersecurity are always needed through conti... Read more
- January 6, 2017
Machine Learning – The Impact On The Cloud
Modern business is becoming ever more data driven with customers and companies generating large amounts of information all the time. Being able to successfully analyse and draw insights from this data can help businesses work more effectively and efficiently. Many companies could benefit from... Read more
- December 22, 2016
Cybersecurity Skills Gap: What Does It Mean For Your Chambers?
1 in 4 IT professionals say a lack of skilled cybersecurity workers is responsible for cyber theft affecting their businesses. It is estimated that as many as 15% of all cybersecurity jobs will go unfilled by 2020, leaving a significant hole in many businesses’ IT security strategies. Finding ways... Read more
- December 16, 2016
The Future Of Cybersecurity – What Can We Expect In 2017?
2016 saw a number of high profile incidents of cyber crime, including the hacking of the Democratic party during the US Presidential Election and a major DDoS attack which managed to shut down key services including Netflix, Amazon and CNN. With 1 in 5 businesses suffering data loss in the last year... Read more
- December 9, 2016
The Internet of Things and Cyber Security
According to some predictions, there will be as many as 34 billion devices globally connected to the internet by 2020. Of these, more than two-thirds are expected to be part of the Internet of Things (IOT). The Internet of Things has many advantages, such as letting you control you home heati... Read more
- December 2, 2016
Tesco Bank Cyber Attack – What Can We Learn?
In early November, Tesco was the victim of a cyber attack in which over £2.5million was stolen from approximately 9,000 of its customers’ accounts. As a result, Tesco has been forced to repay the stolen money to its customers and is now working with the National Crime Agency and other auth... Read more
- November 24, 2016
‘Foreign Actors’ – The Threat to UK Cybersecurity
Cyber security threats are increasing day by day, and it is not just individuals and businesses that are being threatened. With improvements in technology and access to the internet, and with more and more information being stored electronically, so-called ‘foreign actors’ are finding new... Read more
- November 18, 2016
VOIP Security – Is Acoustic Eavesdropping a Concern?
When you are using VOIP to speak to clients and co-workers, do you ever worry that hackers could be using those calls to steal critical data, including usernames and passwords? Incredible as it might seem, recent research shows that it is now possible for hackers to break into your VOIP calls... Read more