Five warning signs you are at risk of a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial losses from lost sales, remediation an… Continue reading Five warning signs you are at risk of a data breach

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground up and in some cases forgoing physical pr… Continue reading Banking – Building trust in an age of disruption

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises the identifi… Continue reading Cyber risk management: safeguarding your organisation

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk management, an or… Continue reading Every organisation is affected by cyber risk!

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you decide to use in your project, it needs to take into account many elements, such as assets, threats, vulnerabilities and controls, an… Continue reading How long does an ISO 27001 risk assessment take?

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had suffered a data breach. Ping’s 2018 Consumer Survey, which polled more than 3,000 people across Europe and the US, also found that: … Continue reading 78% of customers won’t go back to a breached organisation

Education sector data breaches skyrocket

You only have to look at the headlines to see that the education sector is under attack. One in five schools and colleges have fallen victim to cyber-crime, according to research from specialist insurer Ecclesiastical. Of those affected, 71% … Continue reading Education sector data breaches skyrocket

Vulnerability Assessment versus Penetration Assessment

We get asked this question frequently, “What the difference between a vulnerability assessment and penetration assessment?”. It’s a great question and one we’d like to shed a bit more light on throughout this blog. Both engageme… Continue reading Vulnerability Assessment versus Penetration Assessment