19 May 2026
Many organisations treat supplier security as a simple yes-or-no question. Either the supplier is “secure” or it is not. In reality, supplier vetting sits on a spectrum. Some parts are straightforward. Others require technical judgement, experience and sometimes independent advice. Sadly most organisations don’t know how to vet their suppliers. The easiest situation occurs when
14 May 2026
I am often asked whether email is “secure enough” for clinical work. The truth is that most privacy problems with email are not caused by failures in the technical continuum, but from ordinary human moments — forwarding the wrong message, including too much detail, sending sensitive information to the wrong address, or assuming an email
14 May 2026
For small businesses, good data privacy starts with visibility — knowing what information is held, where it travels, and who can access it as systems and teams grow over time.


