Loading

How to start your career in cyber security

The cyber security industry is booming. Organisations are increasingly using technological solutions to perform core functions, and they need a way to make sure these processes aren’t vulnerable to cyber attackers. This influx in opportunities…

Infographic: Cyber Attacks and Data Breaches of 2019

Throughout 2019, we kept an eye on cyber attack and data breach reported in mainstream publications, releasing our findings in our monthly blog series.  This allowed us to see how many security incidents were occurring, how many records were involved and which…

How to develop a robust cyber security policy

Technological defences and staff training are two of the most frequently touted measures for preventing data breaches, but their effectiveness is dependent on the way organisations implement them. That means creating a detailed cyber security…

Travelex says it won’t pay ransom to crooks…

While most of us spent New Year’s Eve celebrating, the IT department at Travelex was grappling with a ransomware virus that was spreading through its systems. Almost two weeks on, the currency exchange service is…

How to document the scope of your ISMS

If you’re planning to implement an ISMS (information security management system), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. There will almost…

Loading

How to write an ISO 27001-compliant risk assessment…

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of…

7 steps to a successful ISO 27001 risk…

Risk assessments are at the core of any organisation’s ISO 27001 compliance project. They are essential for ensuring that your ISMS (information security management system) – which is the end-result of implementing the Standard –…