Technology Blog

  • cfadmin
    Increased Fines for Data Loss – Fines can be up to 4% of global turnover or €20m Opt in Consent – Users must be given clear unambiguous consent; Data can be used for defined purposes only Breach notification- Local Supervisory Authority is to be notified within 72hrs Users should be
  • cfadmin
    Cloud Target Operating Model: part 2 Successful Cloud Adoption: Map every step of the way as you begin your cloud first journey. We remove the complexity to save your organisation from the pitfalls. We offer a complete list of services delivered and we make our knowledge work for you. Common
  • cfadmin
    Cloud Target Operating Model: Part 1 You deliver value to its customer or beneficiaries using cloud services. Traditional technologies were designed for an era that moved at a slower pace. Data centre services supply to the various business units it supports everyday. This is a well-defined operating model, which has
  • cfadmin
    The Blockchain Evolution Many people associate blockchain with the cryptocurrency Bitcoin. Yes, it is true that it was the success of Bitcoin that gave the world insight into the blockchain technology. But Bitcoin is just one example of blockchain application. Many other sectors can immensely benefit from the blockchain technology.
  • cfadmin
     ISO 27001:2013 is a security management standard that specifies security management best practices and comprehensive security controls following the ISO 27002 best practice guidance. This is a widely-recognized international security standard in which Data Controllers (e.g. HSE) are showing significant interest, this includes guidelines and general principles for initiating, implementing,

Leave a Reply

Your email address will not be published.