The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destructi… Continue reading The importance of information security

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that allowed “third-party app developers to acce… Continue reading Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you decide to use in your project, it needs to take into account many elements, such as assets, threats, vulnerabilities and controls, an… Continue reading How long does an ISO 27001 risk assessment take?

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself is bad enough, but now everyone in the office is panicking. Some will grumble about how they’re going to … Continue reading So you’ve suffered a data breach? Here’s what you do next

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had suffered a data breach. Ping’s 2018 Consumer Survey, which polled more than 3,000 people across Europe and the US, also found that: … Continue reading 78% of customers won’t go back to a breached organisation

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part of their battle tactics. Data br… Continue reading Understanding the 7 different types of data breaches

Why is an information security policy so important?

Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines the key terms of ISO 27001, the international standard for information security management – de… Continue reading Why is an information security policy so important?

Protecting the NHS from the Consequences of Cybercrime

In recent years, the scale and scope of cyberattacks has increased dramatically. So, too, has the complexity and dynamism of organisation’s IT infrastructures. Collectively, this means that businesses have had to shift their attitude towards info… Continue reading Protecting the NHS from the Consequences of Cybercrime

Vigilant Streamlines ISO 27001 Risk Assessments with vsRisk Cloud

New cloud-based information security tool will enable enterprises to deliver fast, accurate and hassle-free ISO 27001 security risk assessments 1st October 2018 – Information security and compliance specialist, Vigilant Software, has announced th… Continue reading Vigilant Streamlines ISO 27001 Risk Assessments with vsRisk Cloud

Education sector data breaches skyrocket

You only have to look at the headlines to see that the education sector is under attack. One in five schools and colleges have fallen victim to cyber-crime, according to research from specialist insurer Ecclesiastical. Of those affected, 71% … Continue reading Education sector data breaches skyrocket