Loading

How to develop a robust cyber security policy

Technological defences and staff training are two of the most frequently touted measures for preventing data breaches, but their effectiveness is dependent on the way organisations implement them. That means creating a detailed cyber security…

ISO 27001 management review: a practical guide

As part of their ISO 27001 compliance, organisations must conduct management reviews to address any emerging information security trends and to ensure that their ISMS (information security management system) works as intended. Unfortunately, there’s a…

How to document the scope of your ISMS

If you’re planning to implement an ISMS (information security management system), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. There will almost…

How to write an ISO 27001-compliant risk assessment…

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of…

7 steps to a successful ISO 27001 risk…

Risk assessments are at the core of any organisation’s ISO 27001 compliance project. They are essential for ensuring that your ISMS (information security management system) – which is the end-result of implementing the Standard –…

The damaging after-effects of a data breach

Think your organisation is unlikely to be affected by a data breach? Think again. A Carbon Black study has found that 88% of UK businesses were breached last year, demonstrating just how widespread the threat…

Loading

3 reasons cyber security training is essential

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. According to a study by Centify, 77% of…

5 ways to improve your information security in…

This blog has been updated to reflect industry developments. Originally published Mar 19, 2018. Protecting your organisation against cyber crime can sometimes feel like a never ending game of security whack-a-mole. Just as soon as…