When “someone’s job” stops working
For the first few years, it was obvious whose job everything was. Sarah handled customer onboarding. James owned infrastructure. When […]
For the first few years, it was obvious whose job everything was. Sarah handled customer onboarding. James owned infrastructure. When […]
Most growing organisations don’t fail because they’re reckless. They fail because the ways of working that once felt sensible quietly
This isn’t a training problem. It’s a design problem. When someone bypasses a security control, the instinct is to assume
Your training dashboard shows 96% completion. Your audit report notes that mandatory security training is complete for the year. Your
Every November, it arrives. The email. The reminder. The twelve-month countdown has expired, and it’s time once again to complete
Most security failures aren’t caused by missing controls. They’re caused by ordinary people making understandable decisions under pressure. This isn’t
Most guidance on supplier risk management was written for enterprises with procurement teams, dedicated vendor risk managers, and budgets for
Your supplier sends their ISO 27001 certificate. Professionally formatted, issued by an accredited body, clearly showing they’ve been assessed against
Supplier questionnaires start with good intentions. Someone realises you should probably check the security of platforms handling your customer data.
Every SME uses suppliers. Most use dozens. Hosting, email, payment processing, CRM, accounting, HR systems. The list grows every quarter.