We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data…
For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of…
On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the…
It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself…
We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for…
A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had…
Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to…
Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data…
Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. NTT…
Part 3: Risk treatment: The ISO 27001 Statement of Applicability The SoA (Statement of Applicability) is one of the most…