Why have a formal Code of Conduct?

According to the report ‘Solving the Compliance Conundrum’ published by Towards Maturity in June 2017, 77% of the 250+ compliance professionals surveyed identify Code of Conduct as a key risk within their business. This makes Code of Conduct the second highest risk area behind data privacy and a higher risk priority than health and safety. This fact […]
VinciWorks hosts first risk summit

On 12th September more than 30 senior counsel and heads of risk gathered to discuss the risk horizon at VinciWorks’ first risk summit in the Soho Hotel. Delegates from international law firms, accountancy firms and corporates shared their insights into the issues that they hope will grab their board’s attention as they plan their risk management […]
Why disability confident organisations are more effective

Business should be investing in this area because they’re going to get a return. Businesses don’t engage with this subject for reasons to do with charitable giving or altruism. The investment pays back because you’re accessing talent. You’re enhancing productivity, you’re producing products and services that more people want and more people are able to use.
New Data Protection Bill – key points explained
If you are already preparing for GDPR, and with VinciWorks GDPR Guide to Compliance and our Data Protection: Privacy at Work course, you already should be, then most of what is in the Data Protection Bill will not be news to you. However this will explain the key points of the new Data Protection Bill […]
VinciWorks updates its course Data Protection: Privacy at Work

As the countdown to GDPR implementation progresses, we have refreshed our course Data Protection: Privacy at Work to ensure users benefit from the latest in policy and practice. New modules have been added and existing ones updated to take account of the coming data protection regime; both across Europe and in the UK specifically with the […]
How Secure is your Data? Seven tips for creating strong passwords

Are your passwords as secure as an open door? While many IT security experts are focused on patching software, closing weaknesses, and implementing expensive security software, your employees could be using simple passwords like ‘password’ and ‘abc123’. Weak passwords remain one of the easiest ways to hack into a system, and there are many millions […]
Man in the Middle Hacks: is Your Organisation Vulnerable?
Everywhere you look, hacking seems to be on the rise, and it’s true that many of these attacks are opportunistic. However, some hackers are more calculating than this, conducting attacks over time so they can harvest the data they value. One such approach is the ‘man in the middle’ (MITM) attack. This involves hackers gaining […]
Bupa data breach: 108,000 personal details leaked
Related Courses Bupa, the global health insurance company, admitted recently to a massive data breach affecting their international customers. A rogue employee copied and distributed the details of 108,000 customers. The data did not include financial or health information, but did include names, dates of birth, nationalities and some contact information. Whilst this information may […]
What is Safeguarding Children?

Safeguarding children means protecting the health, well-being and human rights of children and vulnerable adults. It includes enabling them to live free from harm, abuse and neglect. A vulnerable adult is a person over the age of 18 and who is, or may be for any reason, unable to take care of him or herself, […]


