vsRisk Cloud - ISO 27001 risk assessments made simple

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part ...

Why is an information security policy so important?

Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines the key terms of ISO 27001, the international standard for information security ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Two thirds of organisations uninsured against a data breach

Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. NTT Security’s Risk:Value 2018 report found that only 29% of organisations have dedicated ...

The Debt we owe to Arron Banks

However your business is likely to be affected by Brexit, Arron Banks may just have helped you out. How? By drawing attention to the myriad responsibilities organisations have to protect users’ personal ...

Vigilant Software Expands Risk and Compliance Product Portfolio with Data Protection Impact Assessment (DPIA) Tool

The new tool will help data controllers quickly determine whether they need to conduct a DPIA in accordance with GDPR November 2018 – Information security and compliance specialist, Vigilant Software has reinforced ...
vsRisk Cloud - ISO 27001 risk assessments made simple

The cost of a data breach

According to Ponemon’s 2018 Cost of Data Breach Study, the average cost of a data breach is $3.86 million (around £2.95 million), with an average cost of $148 (around £113) per lost ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Part 3: Risk treatment: The ISO 27001 Statement of Applicability

Part 3: Risk treatment: The ISO 27001 Statement of Applicability The SoA (Statement of Applicability) is one of the most important ISO 27001 documents you will produce. It should: Identify the controls ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Conducting an asset-based risk assessment in ISO 27001:2013

ISO 27001 is heavily focused on risk-based planning. This is to ensure that identified information risks are appropriately managed according to threats and the nature of these threats. Under ISO 27001:2013, an ...

Protecting the NHS from the Consequences of Cybercrime

In recent years, the scale and scope of cyberattacks has increased dramatically. So, too, has the complexity and dynamism of organisation’s IT infrastructures. Collectively, this means that businesses have had to shift ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Organisations’ 5 biggest information security concerns

When implementing defences to keep data secure, organisations should put a lot of effort into preventing external actors penetrating them. However, as the 2018 BCI Horizon Scan Report reminds us, there are ...
Loading...