Callcredit Blog

Data breach

Combating the insider Fraudonomics threat: Blog 4/4 – Implement a post breach plan

This gallery contains 1 photo.

In the fourth of a series of short blogs looking at how to combat the threat of fraud from the inside, I will explore what a company can do to minimise damage in the event of a cyber security breach. … » Read more…

Tags: ,

Combating the insider Fraudonomics threat: Blog series 1/4 – Create a culture of awareness

This gallery contains 1 photo.

It’s a fact, employees are the biggest fraud threat to businesses in the UK – over half of internal breaches are carried out by insiders. As the threat landscape develops and trends like the gig economy take off, security and … » Read more…

Tags: , ,

The threat of a data breach on business reputation

This gallery contains 1 photo.

Of the many topics being hotly debated in executive board meetings at the moment, from the uncertainty around the pending EU referendum to the US elections, there’s one topic that is ever present, and increasingly becoming a lead agenda item: … » Read more…

Tags: ,

Are you an ostrich or a meerkat when it comes to data breaches?

This gallery contains 6 photos.

When it comes to dealing with cyber security threats, the differing response of individual businesses often reflects that of different species when threatened by predators in nature. For instance, the response of an ostrich to a predator will be markedly … » Read more…

Tags: , ,