by Tom Eastham | Apr 28, 2022 | Blog
Guide to External Sharing: Management We have reached the end of our three-post guide to External Sharing. In previous posts, we first explained the problem and then considered the challenge of reporting. This final post considers ways of managing the different...
by Tom Eastham | Apr 22, 2022 | Blog
Data Leaks – The Threat Within When we hear talk of data security, we often think of hackers. Mysterious figures attempting to access sensitive information for personal gain. Often though, the cause of data breaches can be much more innocent. While it may be...