Profile cover photo
Profile photo
Jeremy Swinfen Green
133 followers -
Digital transformation; digital strategy; business processes; digital marketing; cyber security and social media risk
Digital transformation; digital strategy; business processes; digital marketing; cyber security and social media risk

133 followers
About
Jeremy's posts

Post has attachment
How many times have you leaked strategic data by accident? And do you even know when you have? There are a multitude of opportunities to share strategic information with third parties such as clients and suppliers by accident. Information that could…

Post has attachment
There is nothing new or unusual about the need to design usable systems. A whole industry has grown up around the business of making sure that commercial websites and apps are easy to use and deliver the behaviour, such as spending money, that the owners…

Post has attachment
“I am going to take cyber security seriously in 2016.” On the whole senior executives claim that they want to act in an ethical manner. And yet if they fail to embrace cyber security they are clearly lying. Why do I say that? Because playing fast and…

Post has attachment
The EU’s General Data Protection Regulations (GDPR) may not be the most exciting topic on your agenda (!) but it is important as new rules to be published shortly will replace current laws on protecting personal data. A draft was published earlier this…

Post has attachment
Cyber risk doesn’t just involve malicious techies hacking into corporate accounts. It can also involve risk to every day business processes: “process cyber risk”. Unfortunately, because the IT Department are kept busy defending the corporate network from…

Post has attachment
You can’t rely on technology to solve your cyber security issues. Cyber security is largely a “people” issue: cyber breaches are generally caused by people behaving in an unsafe manner, whether they know they are doing so or not. The solution is to…

Post has attachment
Invoice fraud is on the rise. It may involve a spoof email, apparently from the CEO of your organisation, “authorising” the payment of a fake invoice. In other cases the email seems to come from a trusted supplier. Two of my friends who run SMEs have…

Post has attachment
Cyber security training – most IT security people would say that’s the answer to solving the insider threat problem. But is it? Giving people information is certainly part of the solution. But training rarely changes behaviour. Peer pressure does. And…

Post has attachment
Can cyber security have auras? How can cyber security have an “auras? It sounds like a meaningless question. But step back a little and think about how direct marketing works. Commonly, people in direct marketing use a simple mnemonic to describe the…

Post has attachment
Human Resources managers may not be particularly focussed on technology. But they have a responsibility to learn about cyber security because the role that HR can play in managing and enhancing security is enormous.
Wait while more posts are being loaded