Share This Post

Would your business pass the 3 beers test?

It’s a Thursday evening. You’ve travelled to meet some contacts, and had a great day.

The meeting is very productive, and turns into 3 beers and a meal. Great fun and the night quickly slips away from you.

You rush for a late train home, and on your commute back flick through a few emails and news articles on your phone. But it’s a warm carriage, and combined with a full stomach and the effects of a few beers, your eyelids start to droop…

(we’ve all experienced something like this, haven’t we?)

You wake with a start as the train pulls to a stop, and you hear the automated voice announce the train has arrived at… your stop. In a rush you grab your phone, coat and jump off the train onto the platform.

Yes! You did it! That was close…

The train starts to pull away… and suddenly you feel sick.

Your laptop bag. Where’s your laptop bag? You put it in the luggage rack… Oh… My… IT’S STILL ON THE TRAIN…

You watch with despair as the train pulls away, taking your laptop with it.

[youtube https://www.youtube.com/watch?v=FmWSts-__jg&w=560&h=315]

A few years ago, a situation like this would have just been annoying and inconvenient. But that’s about it. Laptops are easily replaced commodity products. Data backups mean your information can be recovered.

However, under GDPR, this scenario has potentially quite a different outcome.

Because the new law requires you decide whether or not a data breach – which includes losing data – should be reported to the authorities… and to the people whose data has been lost.

Sound like something that could happen to your business? Get our free GDPR data security guide today.

Fill in your details here to get your free guide emailed to you – instantly.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

How quickly should you get your IT problems fixed?
IT Security

How Quickly Should Your IT Problems Get Fixed?

IT Problems are probably one of the most frustrating things that can happen within your business. What are you to do when you’ve got deadlines to meet, or you’re working from home and can’t access anything? Are you then expected to contact your IT support and wait? How long should you wait? The answers to

Hackers are Beating Multi-Factor Authentication

Just when your thought your cloud applications were secure by implementing multi-factor authentication, hackers are developing strategies to beat this defence. If you didn’t already know, Multi-factor authentication is an essential part of your IT security for logging into your devices and cloud applications. With multi-factor authentication, you need to enter your username and password

Scroll to Top