Risk & Compliance

As part of the Landmark Academy, we host webinars to provide guidance and training to help property solicitors and conveyancers identify and manage a host of risks that can occur in residential and commercial property transactions.

Jess Carey Posted By Jess Carey
from Burlington Media

Data security experts all echo the same sentiment: “It’s not if your organisation will be breached, it’s when.” Does your business have a breach response plan? In this blog, we offer several steps to take after a data breach so you can create - or update - your breach response plan.

Stay Calm

A data breach can cause widespread panic throughout your organisation. The key is not to overreact. As a leader, you must stay calm so you can address the situation with clarity and move forward with an incident response plan.

Post a Comment

What are penetration testing sessions?

We exclusive training sessions that take a closer look at the techniques used when performing a penetration test. The sessions help IT managers, IT directors and CISO’s understand exactly how an organisation can fall victim to cyber-attack.

Claim Technology are pleased to announce a partnership with Verius Risk Solutions. Verius’s VBase software contains over 6 million claims and over 100 million records, enabling businesses to access unique data sources of interest to the insurance industry and mobility suppliers in the fight against fraud.

“As we create the ‘touchless’ digital claim, we need to ensure that our fraud prevention and detection capabilities are second to none. This partnership is another step towards that goal” comments Michael Lewis, CEO.

Tip one: don’t take media home

Many small business owners take their backup media home with them. If you’re one of them, ask yourself the following question: What will happen to your data if tapes are stolen from your car or left on a bus or train? A data backup and rotation service eliminates the risks of taking your media home. After your media is backed up, it should be transported to a data vault in a secure, GPS-tracked vehicle for storage.

Post a Comment

By Fiona Hamilton, head of client services, Sprout IT

Given the highly sensitive nature of the data held on individuals and companies by legal firms, solicitors’ practices and barristers’ chambers often find themselves disproportionately targeted by cybercriminals keen to access their systems, download their data, and sell it to the highest bidder.

What are Sprout IT’s top 8 easy-to-follow rules for firms looking to protect themselves, their clients, and their staff?

1.   Don’t use obvious passwords

Post a Comment

This article was written by Thomas Crabtree, head of service development and learning at Ten10


Testing is all about providing information to stakeholders about the quality of a system. There are a number of different types of testing that can be used to explore and test a system. The type of testing typically depends on what is actually being tested and the approach that is used to perform the testing.

Post a Comment

The number one cause of data breaches worldwide is human error. A notoriously difficult thing to prevent, simple mistakes like addressing an email to the wrong person can end up causing serious reputational damage to a business. cleanDocs is a powerful line of defense against data leaks through email since it asks users to check and confirm the email recipient before it leaves their outbox.

Pinnacle has announced the official release of its client due diligence (CDD) solution following successful pilots in two top 20 law firms over the summer.

CDD has been designed to help global firms manage the myriad stringent requirements more efficiently, in particular catering for the subtle differences in client due diligence that exist in the UK, Netherlands, Belgium and the US.

Every document scanning project needs a roadmap to ensure its success. Here are several guidelines to follow when digitising your documents:


Without a plan, a project scope can expand endlessly or fizzle out before the goal is reached. Know your workflow objectives, file activity levels, and retention requirements before you start scanning.

Post a Comment
Syndicate content