Five warning signs you are at risk of a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial losses from lost sales, remediation an… Continue reading Five warning signs you are at risk of a data breach

How can I check if I am GDPR compliant?

It’s been a year since the EU’s GDPR (General Data Protection Regulation) was introduced. We all remember the flood of emails from businesses asking for confirmation that we wished to remain on their marketing lists and have our details sto… Continue reading How can I check if I am GDPR compliant?

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground up and in some cases forgoing physical pr… Continue reading Banking – Building trust in an age of disruption

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises the identifi… Continue reading Cyber risk management: safeguarding your organisation

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk management, an or… Continue reading Every organisation is affected by cyber risk!

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with.  Today’s… Continue reading Myth-busting: Why risk assessments shouldn’t be a one-time thing

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that allowed “third-party app developers to acce… Continue reading Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you decide to use in your project, it needs to take into account many elements, such as assets, threats, vulnerabilities and controls, an… Continue reading How long does an ISO 27001 risk assessment take?

GDPR-compliant organisations reaping the benefits, study finds

Organisations that meet the requirements of the GDPR (General Data Protection Regulation) experience a wide variety of benefits, according to a new Cisco report. The 2019 Data Privacy Benchmark Study demonstrates that GDPR complianc… Continue reading GDPR-compliant organisations reaping the benefits, study finds