Image Image Image Image Image Image Image Image Image Image

Outsource magazine: thought-leadership and outsourcing strategy | August 22, 2017

Scroll to top

Top

Data Security

Brexit splits UK businesses over data law

May 4, 2017 |

As Brexit slowly begins to become a reality, there are worrying signs that British businesses are cancelling vital data protection reforms – in the mistaken hope that rules will change once the UK has left Europe.

The UK vote to … Read More

EU GDPR: key actions you might still have time to take

April 7, 2017 |

In an effort to better protect its citizens’ data, the European Union will be implementing the General Data Protection Regulation – or GDPR – in May of 2018.

While we’re of the mindset that compliance isn’t always equal to security, … Read More

Brexit: more March Madness

March 30, 2017 |

There’s a new twist on March Madness, at least in the United Kingdom’s IT services world, as the UK has officially triggered Article 50 of the Lisbon Treaty advancing Britain’s separation from the European Union. This blows open the future … Read More

The tip of the infosec iceberg?

March 20, 2017 |

Recent stories by, amongst others, the BBC detailing large, well-organised and presumably very profitable scamming organisations targeting UK TalkTalk customers have hardly helped the already-lowly reputation of offshore contact centres – but may unfortunately be only the tip of a … Read More

Humans and machines will collaborate for better customer interactions

March 7, 2017 |

In today’s business climate, it is innovation levels coupled with speed to market that will determine a company’s success. This was one of the reasons why, in 2016, we saw more interest in trends around optimising business processes – from … Read More

The ‘mid-market reality check’: what are the real procurement priorities for UK medium-sized businesses in 2017?

March 6, 2017 |

There always seems to be plenty of commentary around what’s driving innovation and growth in both large enterprises and startups. By comparison, the mid-market seems slightly neglected; this seems an oversight given the crucial role it plays in the UK … Read More

Outsourcing realities: what business executives need to know

March 6, 2017 |

Congratulations! It’s been three years since you decided to outsource accounts payable. Or, accounts receivable, or customer care, or payroll, or HR, or procurement, or any one of a dozen business process functions typically outsourced, in part or in full. … Read More

What your suppliers aren’t telling you (and why you should worry)

February 27, 2017 |

In a multi-partner service delivery model, transparency and visibility are essential to an effective security and supplier risk management (SRM) strategy. Yet a wide range of evidence suggests that this transparency is sorely lacking in many cases.

According to a … Read More

Cyber-attacks: can you contract against damage caused by supplier data breaches?

June 8, 2016 |

The data and cyber regulatory regime in the EU – which includes, for the time being at least, the UK – is undergoing a very significant shake-up. The new General Data Protection Regulation which will come into force on 25 … Read More

Privacy Shield: a new regime for international data transfers

February 8, 2016 |

The basis upon which European businesses are able to send personal data outside of Europe – and, especially, to the United States – has recently been the subject of intense scrutiny and negotiation between the EU Justice Commissioner and the … Read More

2015: the year of the breach

December 11, 2015 |

At the start of 2015, Cisco CEO John Chambers warned that if people thought 2014 was a bad year for hacking, 2015 would be even worse. This was a significant claim to make, considering some of the high-profile attacks last … Read More

Selling security to the end user: avoid FUD

November 25, 2015 |

Without sounding like a broken ringtone, it’s attacks like the TalkTalk breach that, once more, bring IT security to the top of the agenda. I imagine business owners in the past month have been thinking “if TalkTalk can fall victim … Read More

Cybersecurity in the supply chain

November 23, 2015 |

The last eighteen months or so have seen a very significant increase in the number of cyber-attacks reported. These attacks have hit companies across a variety of sectors: TalkTalk, Morrisons, Sony, J.P. Morgan, Home Depot and of course, Ashley Madison, … Read More

Insider threat

October 9, 2015 |

The organisational struggle to understand insider threat continues and as threat actors go, it continues to be one of the most successful – and potentially devastating to any business. Yet some organisations are still failing to grasp who their insiders … Read More

The Ten Commandments of Neira Jones

November 28, 2014 |

As technology continues its remorseless advance into our lives, concerns over privacy, data protection and basic security have never been higher up the agenda. Therefore I was delighted today to find an article on LinkedIn by the marvellous Neira Jones … Read More

Life after Snowden: what next?

April 24, 2014 |

Following on from my column – and call for input – last month regarding the ramifications of the Edward Snowden affair for the outsourcing space: this week we hosted our webinar ‘Life after Snowden – what are the implications on … Read More