ISO 27001 Compliance
Vigilant Software’s most wanted: Data Breach Bulletin (May 2019)
According to the ICO (Information Commissioner’s Office), more than 14,000 data breaches were logged in the first year since the introduction of the GDPR (General Data Protection Regulation), which is almost four ...
Why are so many CIOs leaving the NHS?
Last November, Health Secretary Matt Hancock told NHS chiefs: “If you haven’t got your CIO on board then you need to be asking serious questions of yourself.” Hancock argued that CIOs were ...
Is ISO 27001 accreditation worth it?
Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a ...
Banking – Building trust in an age of disruption
Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...
Information security risk assessment: A compliance checklist
Risk assessments are at the heart of organisation’s information security practices, as they help identify relevant threats and the most appropriate way of dealing with them. But what should the process look ...
Every organisation is affected by cyber risk!
Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk ...
Myth-busting: Why risk assessments shouldn’t be a one-time thing
We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with ...
The importance of information security
Sensitive data is one of an organisation’s most important assets, so it makes sense that you prioritise its security. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, ...
Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies
On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the move: low user engagement and, more insidiously, software design flaws that ...
Strictly private: Why ISO 27001 is a big deal
Information security standards such as those developed and published by the ISO (International Organization for Standardization) might not be enshrined in law, but that doesn’t mean they should be viewed as a ...