Foration Blog

Jargon-Buster: Foration's glossary of IT Compliance terms

With high-profile cases of cybercrime and data leaking on the rise, now more than ever it’s important to ensure that your business and users are keeping up with the latest in IT and security compliance rules.

From keeping your user data safe to complying with governmental data storage requirements, having strict guidelines in place is essential for ensuring the smooth running of your organisation and for preventing mistakes.

With a lot of talk of compliance and security online these days, however, it’s easy to get confused by all the terms and jargon being used in the industry. To help clear things up, whether you’re an IT business support manager or a curious novice, here is our glossary of the key IT compliance terms:

The complete IT relocation checklist

Whether you’re moving to a new office across town or just switching floors in your current building, relocating your IT infrastructure proves an enormous task. From safely packing and handling hardware to mitigating the risk of data loss en route, there’s a lot to consider to ensure business continuity before you unplug and make the move.

To help your IT migration go as smoothly as possible, here’s a checklist for you to follow - covering the whole process from start to finish.

4 ways to improve your Office 365 Secure Score

With high-profile cases of hacking making headlines around the world, more and more businesses are taking cyber security seriously and are stepping up their efforts to protect their assets and data.

To help Office 365 users in particular ensure the security of their organisations, Microsoft released Secure Score to the public in early 2017 - an analytics platform that assesses a company’s current security measures and suggests any possible improvements that could be made.

Will widespread AI adoption change the way we support our IT systems?

Once the preserve of sci-fi writers everywhere, the prospect of welcoming artificial intelligence into our everyday lives is no longer a surprising or far-fetched idea for many of us.

From voice-controlled assistants like Siri and Alexa, to automated phone systems, marketing platforms and the long-awaited arrival of driverless cars, AI is already in use around us - and its reach is only set to grow in the coming years.

BYOD isn't your only IT compliance challenge

A combination of changing business culture, the rapid evolution of technology and the tightening of regulation means that maintaining IT compliance in the eyes of bodies such as the Financial Conduct Authority (FCA) is a full-time consideration. For many companies, the challenge of compliance is brought into sharp focus by the adoption, in whole or part, of a Bring Your Own Device (BYOD) culture within the organisation.

While BYOD policies have fairly well documented cost, productivity, and practicality benefits, it also poses very real challenges to data security, protection, and your overall compliance.

What is "Microsoft Teams" for Office 365?

We’ve recently witnessed the rollout of Microsoft Teams - a new chat-based collaboration tool, fully integrated within the Office ecosystem. But as you’ll have noticed, work-focused chat tools are hardly a new phenomenon - so why does this offering deserve special attention? We put Microsoft Teams under the spotlight…

What WannCry taught us about the true nature of cyber threats

Once again, cyber security is front-page news. Dubbed WannaCry, the ransomware attack unleashed earlier this month has affected an estimated 200,000 (and counting) computers across the globe. The NHS, Scottish Power, Renault, O2 and the China National Petroleum Corporation are just a handful of the organisations affected.

Significant though the attack was, it wasn’t exactly surprising - and nor should it be thought of as a once-in-a-blue-moon event.

Once and for all! Is the Cloud secure?

Cyber-breaches, hacking, and other online attacks on our technology and IT systems is a part of everyday life. Barely a day goes by without report of an organisation, corporation, or institution being brought to its knees by a malicious attack. And when it has impact on those institutions that ‘really’ matter to us, as we’ve seen with the NHS ransomware attacks, we all sit up, take notice, and ponder just how safe we all are, when operating in an online environment.

How to get Cybersecurity buy-in from the C-Suite

Cyber-threats are one of the great risks to businesses of all sizes, across all locations. And this risk is going to increase ever more so as we head into the heart of 2017. Indeed, along with the uncertainty over Brexit, cyber-crime is seen as one of THE biggest threats facing UK business this year.

And yet, despite both recognition that the risk is real, the recent high profile attacks at Tesco Bank, Yahoo and others suggest that too many business leaders are not giving the threat the serious levels of consideration that it warrants. As perhaps highlighted by the fact that almost three-quarters of SME leaders admitted that they had no adequate cover in place to protect against a breach of their system.

How to build trust with your clients in the new age of data regulation?

Businesses and professional services providers are busy getting to grips with the implications of the General Data Protection Regulation (GDPR) - and the new framework it provides.

It’s easy to view compliance as a purely internal matter; essentially a process of joining the dots to keep on the right side of the regulator. But this mindset misses the whole purpose of the new data regime: to increase consumer confidence in the digital marketplace - i.e. to enable your clients to share their data with you, safe in the knowledge that it will be safe.

Subscribe to our Blog

Recent Posts