Gemserv Cyber (@gemservcyber) 's Twitter Profile
Gemserv Cyber

@gemservcyber

Leading independent Cyber & Digital professional services consultancy, comprising #CyberSecurity #DataProtection #DigitalTransformation, division of @Gemserv

ID: 531161885

linkhttps://gemserv.com/sectors/cyber/ calendar_today20-03-2012 11:57:39

2,2K Tweet

883 Followers

2,2K Following

Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Included in the new ISO 27001 controls are threat intelligence, data leak prevention and information security in the cloud. Gemserv can help your organisation maintain its ISO certification. Want to know more? Get in touch today. bit.ly/3SATiim

Included in the new ISO 27001 controls are threat intelligence, data leak prevention and information security in the cloud. Gemserv can help your organisation maintain its ISO certification. Want to know more? Get in touch today. bit.ly/3SATiim
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

President Biden has now signed the Executive Order to Implement the European Union-U.S. Data Privacy Framework. What comes next for organisations? bit.ly/3W8UFI2

President Biden has now signed the Executive Order to Implement the European Union-U.S. Data Privacy Framework. What comes next for organisations? bit.ly/3W8UFI2
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

If your organisation fails to comply with a Subject Access Request (SAR) then you could face a fine of up to £17.5 million, or 4% of annual turnover, depending on which is higher. bit.ly/3U1BZso

If your organisation fails to comply with a Subject Access Request (SAR) then you could face a fine of up to £17.5 million, or 4% of annual turnover, depending on which is higher. bit.ly/3U1BZso
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Cyber Security Awareness Month has drawn to a close, yet risk remains — every 44s an organisation experiences a cyber-attack. Nina Schick and Ian Hirst discuss the cyber security landscape and the importance of flexible solutions in an unpredictable world. bit.ly/3TQ7Yvn

Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

£190 billion is lost every year to fraud. Scams are increasingly sophisticated. They are harder to spot and more of us are falling victim. So what can you do to keep your business protected? bit.ly/3tpWJy6 #FraudAwarenessWeek #FraudWeek #InternationalFraudAwarenessWeek

£190 billion is lost every year to fraud. Scams are increasingly sophisticated. They are harder to spot and more of us are falling victim. So what can you do to keep your business protected? bit.ly/3tpWJy6

#FraudAwarenessWeek #FraudWeek #InternationalFraudAwarenessWeek
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

With smart meters being used as a “repository of valuable consumer data”, what plans does the EC have to protect the privacy of users? Kaveh Cope-Lahooti explores the proposals put forward by the EDPS aimed at protecting the consumer. Read more: bit.ly/3UchYyn

With smart meters being used as a “repository of valuable consumer data”, what plans does the EC have to protect the privacy of users? 
Kaveh Cope-Lahooti explores the proposals put forward by the EDPS aimed at protecting the consumer.

Read more: bit.ly/3UchYyn
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Shiguftah Malik said of the Empowering Women to Lead in Cyber course: "Graduating has not only improved my confidence through leadership workshops, but has also given me the opportunity to network with other professional women in cyber."

Shiguftah Malik said of the Empowering Women to Lead in Cyber course: "Graduating has not only improved my confidence through leadership workshops, but has also given me the opportunity to network with other professional women in cyber."
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

With a recession looming, businesses are looking to work smarter, not harder. As more and more companies turn to privacy enhancing tech, Camilla Winlo highlights the real commercial benefits that these can deliver. bit.ly/3FOq9Np

With a recession looming, businesses are looking to work smarter, not harder. As more and more companies turn to privacy enhancing tech, Camilla Winlo highlights the real commercial benefits that these can deliver. bit.ly/3FOq9Np
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Used correctly, AI has the potential to revolutionise public services by facilitating cost effective, socially beneficial outcomes. Camilla Winlo argues that data privacy is key to unlocking the success of AI in Business Reporter. Read more: bit.ly/3YqWSzQ

Used correctly, AI has the potential to revolutionise public services by facilitating cost effective, socially beneficial outcomes. 
Camilla Winlo argues that data privacy is key to unlocking the success of AI in Business Reporter. Read more: bit.ly/3YqWSzQ
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Gemserv are delighted to sponsor tomorrow evening's SSAFA Corporate Friends Networking event. Our cyber security team look forward to taking part in an insightful discussion on security and defence. bit.ly/3XhXXs2

Gemserv are delighted to sponsor tomorrow evening's SSAFA Corporate Friends Networking event. Our cyber security team look forward to taking part in an insightful discussion on security and defence. bit.ly/3XhXXs2
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

In a rapidly changing landscape, businesses must evolve to tackle new #cyber threats. Ian Hirst predicts three keys areas that these threats are likely to come from, and the ways in which we should adapt to counter them. Read more in IT Supply Chain >> itsupplychain.com/2023-cybersecu…

In a rapidly changing landscape, businesses must evolve to tackle new #cyber threats. Ian Hirst predicts three keys areas that these threats are likely to come from, and the ways in which we should adapt to counter them.

Read more in <a href="/IT_SupplyChain/">IT Supply Chain</a> &gt;&gt; itsupplychain.com/2023-cybersecu…
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Using real-world examples, Camilla Winlo explains the importance of putting individuals at the heart of your privacy programme - and how you can get it right. Find out more and sign up online to this hybrid event: bit.ly/3klHuoy #DataProtection #UserPrivacy

Using real-world examples, Camilla Winlo explains the importance of putting individuals at the heart of your privacy programme - and how you can get it right. 

Find out more and sign up online to this hybrid event: bit.ly/3klHuoy

#DataProtection #UserPrivacy
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

ChatGPT is set to revolutionise the tech world through it's advanced use of AI. So why is #cybersecurity and #dataprotection so important for ChatGPT? Camilla Winlo explains in IT Supply Chain. bit.ly/3XQGION

ChatGPT is set to revolutionise the tech world through it's advanced use of AI. So why is #cybersecurity and #dataprotection so important for ChatGPT? Camilla Winlo explains in IT Supply Chain. bit.ly/3XQGION
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Curious about the data privacy trends we will see this year? Camilla Winlo gives her thoughts alongside other experts in Tech Round. Read more > bit.ly/3D9yzwX #DataPrivacy #DataProtection #DataSecurity

Curious about the data privacy trends we will see this year? Camilla Winlo gives her thoughts alongside other experts in Tech Round. 

Read more &gt; bit.ly/3D9yzwX

#DataPrivacy #DataProtection #DataSecurity
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

#CyberSecurity is a growing and evolving landscape, and businesses need to continue to adapt. Ian Hirst outlines his predictions for 2023 – where threats are likely to come from, and how organisations need to tackle them. Read more in UK Tech News: bit.ly/405CogD

#CyberSecurity is a growing and evolving landscape, and businesses need to continue to adapt. Ian Hirst outlines his predictions for 2023 – where threats are likely to come from, and how organisations need to tackle them.

Read more in UK Tech News: bit.ly/405CogD
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Privacy-enhancing technologies (PETs) may help businesses meet their obligations while also gaining the benefits of customer data. There are advantages of PETs, but they must be used with care. Camilla Winlo explains all in Raconteur: bit.ly/3WYKJ2M #PET #DataPrivacy

Privacy-enhancing technologies (PETs) may help businesses meet their obligations while also gaining the benefits of customer data. There are advantages of PETs, but they must be used with care. 

Camilla Winlo explains all in <a href="/Raconteur/">Raconteur</a>: bit.ly/3WYKJ2M

#PET #DataPrivacy
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

ChatGPT looks set to transform our society yet there is scope for misuse; scammers can use it to trick people. Ian Hirst identifies the risks and how they can be overcome. What is Chat GPT? Why is it here to stay? — Tech Funding News (bit.ly/3xgYbEP) #AI #CyberSecurity

ChatGPT looks set to transform our society yet there is scope for misuse; scammers can use it to trick people. Ian Hirst identifies the risks and how they can be overcome.

What is Chat GPT? Why is it here to stay? — <a href="/TFNBreakingNews/">Tech Funding News</a>  (bit.ly/3xgYbEP)

#AI #CyberSecurity
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Cyber-attacks are rising, and the tools that malicious actors have at their disposal are constantly expanding. In Networking+ this week, Ian Hirst explores the rise of ransomware and the best practice for preventing becoming a victim. Read more: bit.ly/3YjQmt3

Cyber-attacks are rising, and the tools that malicious actors have at their disposal are constantly expanding. In <a href="/networkingplus/">Networking+</a> this week, Ian Hirst explores the rise of ransomware and the best practice for preventing becoming a victim.

Read more: bit.ly/3YjQmt3
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

Does your organisation document which third parties have access to individual’s data? Due to recent CJEU ruling, organisations must now be prepared to specify who they share individuals’ data with. Read Zoe Allamenou's latest blog to find out more: bit.ly/3yLocNv

Does your organisation document which third parties have access to individual’s data?

Due to recent CJEU ruling, organisations must now be prepared to specify who they share individuals’ data with.

Read Zoe Allamenou's latest blog to find out more: bit.ly/3yLocNv
Gemserv Cyber (@gemservcyber) 's Twitter Profile Photo

The Gemserv Cyber channel is moving. You can still keep up-to-date with the latest insights on cyber security and data protection (and exciting developments across the energy and low carbon sectors) by following @Gemserv.