Senior adults attend a computer class, led by an instructor, in a classroom setting.
| |

The Role of Staff Training in Breach Prevention

Human error causes most data breaches. Training is your first defence. Here’s what good training includes. Even the best systems fail when staff don’t understand data risk. Good training should cover: Make it: Training isn’t optional — it’s your insurance policy against simple mistakes becoming major incidents.

A dramatic depiction of a hand pressed against a foggy, illuminated window.
|

Top 5 Causes of Data Breaches in Professional Services

Knowing where breaches start is half the battle. These five causes account for most incidents in professional firms. Most data breaches stem from everyday errors — not hackers. In professional services, the top five causes include: All of these can be reduced with training, tech, and clear policy enforcement.

A hooded figure engaged in hacking using a laptop and smartphone in low light.
| |

Who Needs to Be Told? Notifying Data Subjects After a Breach

Should you notify individuals after a breach? UK GDPR requires it if their risk is high. Here’s how to assess that. If a data breach is likely to result in a high risk to the rights and freedoms of individuals, you must inform them without undue delay. High-risk examples: Your message should: Clear and timely…

An adult woman in casual attire reviewing notes on a tablet in a stylish office setting.
|

Annual Retention Reviews: A Quick Win for Compliance

A yearly review of your retention practices helps avoid silent failures. Here’s how to do one well. Retention rules are only as good as their enforcement. An annual review ensures your policies are followed — and still relevant. What to include in your yearly audit: Make it light-touch but regular. Small course corrections now prevent…

Mysterious figure wearing a Guy Fawkes mask, illuminated by computer screens in a dark room.
| |

Breach Risk Increases With Ageing Data

The older the data, the more dangerous it becomes. Here’s why ageing data is a hidden security risk. Most cyber breaches don’t happen with fresh data — they happen with old, forgotten, poorly protected files. Why? Retention = risk control. Regularly deleting old personal data significantly reduces the impact of a breach — both legally…

A woman using her phone at a desk, surrounded by art supplies and a laptop, in a creative workspace.
| |

Data Retention for Ex-Employees: A Hidden Risk

Are you keeping leavers’ data too long? Learn what the law says and how to reduce legal exposure. Many organisations store former employee data indefinitely — just in case. But UK GDPR doesn’t allow for “just in case” retention. Key retention timelines to know: After this period, data should be deleted or anonymised. Keeping more…

A close-up photo of a smartphone displaying popular apps like Google and Mail.
|

Is Your Email Archive a GDPR Liability? Probably.

Email systems are often the biggest data retention risk. Here’s what compliance and IT need to fix. Email is often overlooked in data retention strategies — yet it’s where the most unstructured personal data lives. Archived emails may contain salary details, medical information, and candidate records — often held for years without review. UK GDPR…