vsRisk

The importance of information security

For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of…

2 years ago

Reputation equals revenue: Why data security and compliance are crucial for ambitious tech companies

On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the…

2 years ago

How long does an ISO 27001 risk assessment take?

Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you…

2 years ago

So you’ve suffered a data breach? Here’s what you do next

It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself…

2 years ago

78% of customers won’t go back to a breached organisation

A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had…

2 years ago

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data…

2 years ago

Why is an information security policy so important?

Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines…

2 years ago

Part 3: Risk treatment: The ISO 27001 Statement of Applicability

Part 3: Risk treatment: The ISO 27001 Statement of Applicability The SoA (Statement of Applicability) is one of the most…

2 years ago

Protecting the NHS from the Consequences of Cybercrime

In recent years, the scale and scope of cyberattacks has increased dramatically. So, too, has the complexity and dynamism of…

2 years ago

Vigilant Streamlines ISO 27001 Risk Assessments with vsRisk Cloud

New cloud-based information security tool will enable enterprises to deliver fast, accurate and hassle-free ISO 27001 security risk assessments 1st…

2 years ago