Contributors | Spark

SIGN UP FOR THE SPARK NEWSLETTER

Spark Blog

Helping ignite the power of your people.

search icon
Fran Howarth

Fran Howarth 

Fran Howarth is an industry analyst specialising in security. She has worked within the security technology sector for more than 25 years in an advisory capacity as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include mobile security, cloud security, information governance and data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations.

Latest Articles  by  Fran 

Smart Risk Taking for Small Businesses: Top 5 Tips

Risk and Compliance

Smart Risk Taking for Small Businesses: Top 5 Tips

Sexual Harassment Policies: A Necessity for Safe Work Environments

Risk and Compliance

Sexual Harassment Policies: A Necessity for Safe Work Environments

Tips for Your Company Dress Code: Select, Establish and Enforce the Right Fit

People Management and Growth

Tips for Your Company Dress Code: Select, Establish and Enforce the Right Fit

Insuring Intangible Assets: Why Your Business Needs More Than General Insurance

Risk and Compliance

Insuring Intangible Assets: Why Your Business Needs More Than General Insurance

Establishing Organizational Policies for Seasonal Employees

Risk and Compliance

Establishing Organizational Policies for Seasonal Employees

Suing Small Businesses: Trends to Watch

Risk and Compliance

Suing Small Businesses: Trends to Watch

Shrinking Market Size: How to Keep Your Business Running

Risk and Compliance

Shrinking Market Size: How to Keep Your Business Running

Is Your Cybersecurity Plan Robust Enough to Protect Your Business?

Risk and Compliance

Is Your Cybersecurity Plan Robust Enough to Protect Your Business?

How to Tell Whether Remote Employees Are Keeping Confidential Business Data Safe

Risk and Compliance

How to Tell Whether Remote Employees Are Keeping Confidential Business Data Safe

How to Clear a Computer or Other Business Device

Risk and Compliance

How to Clear a Computer or Other Business Device

Load More

Sign up for the SPARK newsletter

If you haven’t yet subscribed to SPARK, sign up now to receive the most current insights and resources to keep you and your business up-to-date.