For many organisations, information is their most important asset, so protecting it is crucial. Information security is “the practice of…
On 2 April, Google+ will cease to exist for external users. The search giant has cited two main reasons for the…
Completing a risk assessment is often the most complex and difficult aspect of an ISO 27001 project. Whatever tool you…
It’s an announcement few information security specialists want to make: the organisation has suffered a data breach. The breach itself…
A Ping Identity study has revealed that 78% of consumers would no longer use a retailer’s website if it had…
Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data…
Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines…
Part 3: Risk treatment: The ISO 27001 Statement of Applicability The SoA (Statement of Applicability) is one of the most…
In recent years, the scale and scope of cyberattacks has increased dramatically. So, too, has the complexity and dynamism of…
New cloud-based information security tool will enable enterprises to deliver fast, accurate and hassle-free ISO 27001 security risk assessments 1st…