6 most common cyber attacks

Cyber crime is at an all-time high. While organisations are trying to counter cyber attacks, criminal hackers are becoming more innovative and their attacks more sophisticated. What is a cyber attack? Cyber attacks are del… Continue reading 6 most common cyber attacks

Life’s a breach – the harsh cost of a data breach for professional services firms

Data breaches are an unavoidable fact of life for all organisations, including professional services firms. It’s not a matter of ‘if’ a firm might be breached, but ‘when’. The cyber threat to the global professional servic… Continue reading Life’s a breach – the harsh cost of a data breach for professional services firms

How vsRisk can simplify your ISO 27001 risk assessment

An ISO 27001 risk assessment is at the core of your organisation’s ISMS (information security management system). The Standard is explicit in requiring that a risk management process be used to review and confirm security controls in light of reg… Continue reading How vsRisk can simplify your ISO 27001 risk assessment

ISO 27001 risk assessments: The problem with using spreadsheets

An ISO 27001 risk assessment is at the core of your organisation’s information security management system (ISMS). Those new to tackling this complex step may rely on using a manual, inexpensive solution such as spreadsheets, but there are many di… Continue reading ISO 27001 risk assessments: The problem with using spreadsheets

Understanding our risk assessment software

Our sales and support executive Gary Baxter, has produced an extended demonstration video for our risk assessment software vsRisk 3.0. The aim of the video is to walk you through the software and help you decide whether it’s the right product for… Continue reading Understanding our risk assessment software

How to create a risk treatment plan for your information security management system

A risk treatment plan (RTP) is one of the mandatory reports that you will need to produce for your ISO 27001 information security management system (ISMS). What is a risk treatment plan? An RTP provides a summary of each of the identified risks, the re… Continue reading How to create a risk treatment plan for your information security management system