The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that allowed “third-party app developers to acce… Continue reading Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you decide to use in your project, it needs to take into account many elements, such as assets, threats, vulnerabilities and controls, an… Continue reading How long does an ISO 27001 risk assessment take?

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself is bad enough, but now everyone in the office is panicking. Some will grumble about how they’re going to … Continue reading So you’ve suffered a data breach? Here’s what you do next

Why should you subscribe for a free trial?

At the beginning of January, Vigilant Software launched a free seven-day trial of its software tools: vsRisk Cloud, the Data Flow Mapping Tool, Compliance Manager, the DPIA Tool and GDPR Manager. A free trial is the best way to understand how our softw… Continue reading Why should you subscribe for a free trial?

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had suffered a data breach. Ping’s 2018 Consumer Survey, which polled more than 3,000 people across Europe and the US, also found that: … Continue reading 78% of customers won’t go back to a breached organisation

Transferring data after a no-deal Brexit

The past two years of Brexit negotiations have largely proved the late William Goldman’s adage that “nobody knows anything”. No one can tell you what Brexit will entail, very little has been finalised and there’s a real possibil… Continue reading Transferring data after a no-deal Brexit

Customers lose confidence – data breaches aren’t just about fines

A recent survey by Ping Identity shows that customers move away from brands that have suffered data breaches. Data breaches are now a common occurrence – big-name brands affected in 2018 include FIFA, British Airways, Vis… Continue reading Customers lose confidence – data breaches aren’t just about fines

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part of their battle tactics. Data br… Continue reading Understanding the 7 different types of data breaches

Why is an information security policy so important?

Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines the key terms of ISO 27001, the international standard for information security management – de… Continue reading Why is an information security policy so important?