Cyber Security Archive
Welcome to our September 2023 review of cyber attacks and data breaches, in which we look at some of the most newsworthy security incidents across Europe. On the face of it, September was a quiet month in terms of cyber …
The path to compliance with data protection laws such as the GDPR (General Data Protection Regulation) is strewn with potential pitfalls. From processing personal information without a valid lawful basis to failing to implement appropriate technical and organisational security controls, …
Cyber attacks and data breaches are an everyday operational risk for all organisations that rely on technology or are connected to the Internet. However, relatively few organisations implement the cyber incident response measures they need to deal with the inevitable. …
Organisations in the financial sector or that supply ICT (information and communication technology) services to financial organisations in the EU need to prepare for new rules that come into effect in January 2025. Recognising that the financial sector’s increasing reliance …
The Cyber Resilience Act is one step closer to reality, as the European Parliament and the Council voted in favour of its proposed rules. With this decision, the EU could soon have its first set of cyber security and data …
The key to managing data breaches is preparation. If you have a plan for how you’ll respond to information security breaches, you can get started on remediation immediately. This will limit the immediate damage and help you get up and running again as soon as …
Amid all the expert advice about how to keep your organisation safe from data breaches, it’s important to remember that there’s no one right way to address information security.
Sure, there are universal threats and technologies and processes that address …
The ISO 27001 Standard describes best practice for an ISMS and explains the requirements you need to meet, but it doesn’t show you how to implement them. In this blog, we explain in nine steps exactly what you need to …
The rise of cyber attacks and data privacy concerns has information security a top priority for organisations. Many have chosen to mitigate the risk by implementing an ISMS (information security management system). Creating an ISO 27001-compliant ISMS is a big task, but the benefits it provides makes it an essential …
IT Governance led the world’s first ISO 27001 certification project and we’ve been at the forefront of the cyber security initiative ever since. Certification to ISO/IEC 27001 demonstrates to existing and potential customers that you have taken the necessary steps …