The growing risk of data breaches coupled with the GDPR’s (General Data Protection Regulation) strict regulatory requirements has led many organisations to look for proven, affordable ways to achieve robust cyber security.
According to the professional services firm’s Global Information Security Survey 2018–19, 87% of respondents said they don’t have the budget to deal with threats – despite an upwards trend in cyber security spending. Ernst & Young suggests that organisations address …
The GDPR (General Data Protection Regulation) outlines six principles that organisations must follow when collecting, processing and storing individuals’ personal data. Data controllers are responsible for complying with those principles, and they must have documented proof of how the organisation …
Microsoft reported in its incident statement on 12 April that the criminal hackers could have viewed email addresses, folder names and email subject lines, but not email content or attachments.
It’s been almost a year since the GDPR (General Data Protection Regulation) came into force, but Cisco’s 2019 Data Privacy Benchmark Study found only 59% of organisations worldwide are compliant.
It’s not too late to comply with GDPR. The Regulation might have come into effect last year, but it’s requirements need to be regularly reviewed. As such, it doesn’t matter what your compliance posture was six months or a year …
IT Governance’s team of experts has the answers to all your cyber security questions, and our extensive range of products and services can help you implement the necessary cyber security measures. So, what do you need help with?
Saolta University Health Care Group is investigating a potential data breach at UHG (University Hospital Galway) after scam letters were sent to patients’ home addresses.
The longer a breach goes undetected, the more embarrassing it is for the organisation in question. But what’s a good target for identifying an incident?
Learn how to implement and maintain an ISO 27001-compliant ISMS with IT Governance