5 min read

Simple Explanation: What is AES-256 Bit Encryption?

By Gabriella Mangham on 17/06/22 15:55

Convene uses AES-256 Bit Encryption, which is the best security available on the market, but you may not know what this means exactly. We’ve written a very simplified, helpful guide to explain what it is and why you should value it.

Topics: Security
4 min read

How Financial Companies Can Benefit From Convene's Security

By Lucy Palmer on 13/06/22 10:06

Convene is trusted by financial institutions around the world who rely on our software to protect their data. Financial organisations play a crucial role in the global economy and cannot afford to take risks with their data.

Topics: Security
3 min read

What are the 7 Principles of the GDPR?

By Lucy Palmer on 23/08/21 16:28

The UK General Data Protection Regulation (GDPR) is the main law in the UK when it comes to data protection. It was put into place in 2018 and is the UK’s version of the EU law of a similar name. The law makes some important changes from the previous Data Protection Act in how we consider consent and accountability.

Topics: Security
4 min read

What Happens if an Employee Breaches the GDPR?

By Lucy Palmer on 23/08/21 16:27

The General Data Protection Regulation (GDPR) is a law that came into action in the UK in 2018. It’s based on an EU law of a similar name and is the main piece of legislation when it comes to data protection. The law has seven key principles for data collection that are underlined by lawfulness, fairness and transparency.

Topics: Security
4 min read

5 Reasons You Need to Control Your Users and Meeting Space

By Lucy Palmer on 11/05/21 12:22

Virtual Board meetings can solve many of the problems your Board encounters. With new technology, your team members no longer have to be in the same room to have important discussions.

Topics: Security Governance Digital Transformation
3 min read

The Importance of Audit Trails

By Josh Cole-Hossain on 11/05/21 11:03

Audit trails are vital in discovering and understanding what went wrong when a company or organisation suffers a security breach, data loss or misconduct. Having a detailed log of who accessed what and when, can make the search for what went wrong quick and easy. But, as this blog will discuss, there are more benefits to keeping audit trails than being prepared for when something goes wrong!

Topics: Security Governance Board Portal Features
4 min read

Board Portal Login - 4 extra ways to make sure it stays secure!

By Dheng Siah on 18/01/21 09:52

You might have found this page when searching for a login for your board portal. Have you ever thought about how easy it is for others to find the same page that you were looking for and how you can make sure they don’t get any further? The login page is the front door to your commercially sensitive documents so let’s look at ways of making sure it stays shut to unauthorised visitors.

Topics: Security
6 min read

7 benefits of using a Board Portal

By Gabriella Mangham on 24/09/20 09:00

The first stage in any due diligence process is reviewing alternative options to the status quo. You may be wondering how you can save money and still keep the same level of functionality in your current meeting software or processes. This is where Convene can help you out. 

Topics: Security Switching Board Portal Board Portal Features
1 min read

Perspectives of Cybersecurity: Risk and Investment (Part 3)

By Dheng Siah on 29/04/19 14:46

The ‘value’ of cybersecurity comes from the losses that have been prevented as a result of its implementation.

Topics: Security
2 min read

Perspectives of Cybersecurity: Mitigative (Part 2)

By Dheng Siah on 23/04/19 14:42

A mitigative perspective recognises that the best preventive measures are not impregnable.

Topics: Security
1 min read

Perspectives of Cybersecurity: Preventive (Part 1)

By Dheng Siah on 15/04/19 11:57

This is the perspective that everyone probably thinks of when we talk about cybersecurity.

Topics: Security
1 min read

Perspectives of Cybersecurity: Introduction

By Dheng Siah on 10/04/19 15:40

With high profile cyberattacks such as WannaCry and the Sony hack grabbing headlines globally, everyone is aware of the increasing risk of cyberattacks. As such, businesses across the globe have decided to dedicate more resources to their cybersecurity budget. In fact, Bloomberg reports that US financial firms have plans to further increase cybersecurity spending in 2019.

Topics: Security
4 min read

Limitations of SSO and Implementing SSO (Part 2)

By Dheng Siah on 19/03/19 17:08

In my last blog, I introduced the concept of SSO and discussed some of its benefits. I will now address some limitations of SSO and propose measures on how to work around them.

Topics: Security
4 min read

What is SSO and what are the advantages? (Part 1)

By Dheng Siah on 11/03/19 15:32

You enter the meeting room. All eyes focus on you.

Topics: Security
5 min read

SMS One Time Passwords (OTPs) are secure, right?

By Dheng Siah on 28/02/19 13:10

Short answer: No.

Topics: Security

Subscribe to the Convene blog to get regular tips and updates on Governance and Digital Transformation!