Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a structured, comprehensive appro… Continue reading Is ISO 27001 accreditation worth it?

Five warning signs you are at risk of a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial losses from lost sales, remediation an… Continue reading Five warning signs you are at risk of a data breach

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground up and in some cases forgoing physical pr… Continue reading Banking – Building trust in an age of disruption

Establishing Information Security in Project Management

A person recently asked me if it was possible to implement ISO 27001 using a specific project management software product. They used the tool in the past to define project plans and make project reviews. While I told them this is entirely possible, the… Continue reading Establishing Information Security in Project Management

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk management, an or… Continue reading Every organisation is affected by cyber risk!

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with.  Today’s… Continue reading Myth-busting: Why risk assessments shouldn’t be a one-time thing

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that allowed “third-party app developers to acce… Continue reading Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you decide to use in your project, it needs to take into account many elements, such as assets, threats, vulnerabilities and controls, an… Continue reading How long does an ISO 27001 risk assessment take?