Cyber Security Archive
Last year, a new version of ISO 27001 was published, introducing several changes in the way organisations are expected to manage information security. There are new requirements related to planned changes and how organisations should deal with them, as well …
If you’re new to ISO 27001, you might be finding it difficult to choose a training course that suits your needs. Two of the more popular options are the lead auditor and lead implementer courses, but which one is right for …
What do Microsoft, Verizon, Apple, Google, Intel, and Amazon have in common? As well as all being Fortune 500 companies, they are all ISO 27001 certified. With a global growth rate of 20%, ISO 27001 has become the de facto …
In this blog, we explain the difference between a risk assessment and gap analysis, and advise you on how to complete each step effectively and in-line with your business needs.
Welcome to our latest monthly review of cyber attacks and data breaches. In October 2022, we found 102 publicly disclosed security incidents, accounting for 9,990,855 breached records. As ever, you can find the full list of security incidents on our sister …
The hotly anticipated new version of ISO 27001 was published last week, beginning a transition period that will reshape the way organisations are expected to manage information security. ISO 27001 was previously updated in 2013 – almost a decade ago …
Phishing emails are among cyber criminals’ biggest weapons when it comes to stealing people’s personal data. The attacks, which take the form of messages containing malicious links or attachments masquerading as legitimate correspondences, are responsible for some of the most notable …
Welcome to our latest monthly review of cyber attacks and data breaches. In September 2022, we found 85 publicly disclosed security incidents, accounting for 35.6 million breached records. As ever, you can find the full list of security incidents on our …
It might sound crazy to the uninitiated, but organisations across the globe pay people to break into their systems and find sensitive information. The reason they do this is simple: to catch a thief, you must think like one. Organisations hire ethical hackers, otherwise …
Cloud computing is a key tool for organisations everywhere, offering a wealth of opportunity to extend IT capabilities and take advantage of innovations. And as more organisations move to remote or hybrid working, Cloud services are more valuable than ever. …