A third-party supplier has breached the GDPR – am I liable?

A third-party supplier has breached the GDPR – am I liable?

Third-party suppliers are a common source of confusion for organisations considering their GDPR (General Data Protection Regulation) compliance requirements. When the Regulation was first introduced, the issue of third-party suppliers and their ...

Why are so many CIOs leaving the NHS?

Last November, Health Secretary Matt Hancock told NHS chiefs: “If you haven’t got your CIO on board then you need to be asking serious questions of yourself.” Hancock argued that CIOs were ...

Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a ...
5 signs that you might be about to suffer a data breach

5 signs that you might be about to suffer a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with ...
The importance of information security

The importance of information security

Sensitive data is one of an organisation’s most important assets, so it makes sense that you prioritise its security. Information security is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, ...

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself is bad enough, but now everyone in the office is panicking. Some ...