Blog

We love to listen to your opinions – and to share our own!

Welcome to our IT blog! Here you could find a thing or two about current technological and worldly affairs that could affect business.

Here are a few of our observations. Let us know what you think!

Outsourced Data Protection Officer

Let us take care of your data protection, privacy, liaison with regulatory bodies and data subjects. This leaves you with peace of mind and more time to concentrate on core business activities. Cost effectively and professionally. An outsourced Data Protection Officer (DPO) from Twin Systems is a way for businesses to access deep data protection […]

Read More

GDPR Gap Analysis Packages

To understand what you need to do, you first have to understand where you are. That’s exactly what our GDPR gap analysis helps you with. Our GDPR Gap Analysis packages are an ideal way to find the current state of your GDPR compliance, analyse your business policies, processes and technology, and identify areas in need […]

Read More

Insider Threat – Is Your Colleague your weakest link ?

A recent report defines insider threat as the biggest threat to data and company security today. It brings to mind the old adage that Generals always fight today’s battles with the mindset of the last. It could be just as true of data security and the protection of your company’s network. What can you do about it ?

Read More

Agile Working – It’s Time For The Talking To Stop

Just two or three years ago, people liked to talk about agile working – but often it was purely talk.

Now, though, it’s genuinely happening and most people who are planning a change in their workplace – whether it’s a new building, a refurbishment or a look at better utilisation of space – are focusing on agile working. So what are some of the themes that underlie true agile working

Read More

The Teddy Bears are Listening…

When Germany banned a connected doll over security concerns, it wasn’t being overly cautious. As it turns out, there’s a textbook example of what happens when toy data privacy goes horribly wrong. Security researchers have discovered that Spiral Toys’ internet-savvy teddy bears, CloudPets, stored kids’ voice messages to their parents. This also included names and […]

Read More

7 musts to implement BYOD successfully

Mobility is essential for a successful company, but the challenge is securing all that data. A mobile workforce Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use […]

Read More

Ransomware Protection – What you need to know now

‘Malware Mania’ is back with a vengeance creating havoc for organizations of all sizes and in all industries. Ransomware protection is now the top priority for any organisation. Cyber criminals have morphed their attack methods with the resurgence of. malware and encrypting ransomware to evade traditional antivirus and firewall defence. As a result, your IT […]

Read More