risk assessment

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data…

2 years ago

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of…

2 years ago

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the…

2 years ago

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself…

2 years ago

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for…

2 years ago

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had…

2 years ago

NIST releases guidance for risk assessment automation

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to…

2 years ago

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data…

2 years ago

Two thirds of organisations uninsured against a data breach

Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. NTT…

2 years ago

Part 3: Risk treatment: The ISO 27001 Statement of Applicability

Part 3: Risk treatment: The ISO 27001 Statement of Applicability The SoA (Statement of Applicability) is one of the most…

2 years ago