Articles
Articles on information security and other business subjects
Articles on information security and other business subjects
Copyright © 2010 to Date - Safe4 Information Management Limited
Email UK: [email protected]
Email SA: [email protected]
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OKLearn moreWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Email phishing scams increasing rapidly – what is the answer?
/in Blog, News - All, SecurityAlmost everyone who has an email account will have received large numbers of unsolicited emails from an unknown sender requesting that the recipient “click here” to gain access to a website or service that offers something of interest or value. Some of these are laughably inept, and are so obviously scams that they can be […]
Safe4 Conference 2016 a great success
/in Blog, News - AllThe Safe4 Conference 2016, held at Dartmouth House in London in November, proved to be a highly successful day. A very high-profile UK public service client, a leading international bank, an organisation specialising in training and talent development, and a membership organisation serving the will-writing and inheritance planning profession all gave presentations at the event, and […]
Christine Andrews of DQM GRC to present at Safe4 Conference
/in Blog, News - All, SecurityGDPR (General Data Protection Regulation) is looming. This EU-originated legislation will come into force in 2018, and already many UK organisations are becoming aware of the impact that the new regulation will have. The imposition of heavy fines and the more onerous responsibilities placed upon data controllers and data processors are concentrating the minds of […]
Safe4 version 4.5 is released
/in Blog, News - AllSafe4 has been evolving steadily since launch in 2010, and the latest release is delivering some valuable enhancements. As well as a series of underlying improvements to performance and security, some specific changes in functionality are included in this version: The maximum number of failed login attempts has been set at 5, after which the […]
Safe4 to unveil the new Asset Register at the Society of Will Writers Conference
/in Blog, News - All, SecuritySafe4 launched the Digital Inheritance Vault at the Society of Will Writers Conference in October 2015, and this has subsequently been presented at many of the Society’s regional group meetings. Members have been taking up the vault as a means of helping their clients to manage their inheritance plans and digital legacy, and many are […]
Personal email systems still being used to carry confidential information
/in Blog, News - All, SecurityIt is no major surprise to learn that a major email service provider has been hacked – again – and that millions of people have had their personal information exposed to criminals. This is highlighted in an interesting article in The Times, published today. What is still very unfortunate, however, is that a large number […]
Does it matter where your cloud data is stored?
/in Blog, News - All, SecurityMany millions of people now are using online systems that are hosted in the cloud. However, do we all know what that means, or the location where our vital information is being held? The dramatic rise in the use of social media in the last decade has meant that a vast amount of personal information […]
Beware the perils of “free” cloud storage services
/in Blog, News, News - AllAre “free” cloud storage services really free? Logic would suggest that whilst they may appear to be free at the point of actually storing a file, it is worth remembering that the companies who offer free storage services only do so because they want your data. Once stored on their servers, most of the large […]
Proposed successor to Safe Harbor is “inadequate”
/in Blog, News - All, SecurityThe EU has indicated that the replacement to the US – EU Safe Harbor data privacy arrangement, known as Privacy Shield, is inadequate, and does not offer sufficient protection for confidential data being shared by organisations who operate on both sides of the Atlantic. More detail is available: click here. The risks associated with holding […]
Health data services moving to the cloud?
/in Blog, News - All, SecurityDiscussions over the suitability of the cloud for the storage and management of confidential information have grown in intensity in recent years, as the use of cloud-based resources has increased dramatically. There has long been resistance to the use of cloud data services to handle clinical information relating to individuals’ health, based on concerns over […]