Article Resource Type Risk Management resources Resources Virtual CISO blog Risk Management blog Blog
Enhancing Security and Efficiency with CISO-as-a-Service
Many organisations are turning to implementing a CISO-as-a-Service option. The service is not only efficient, [...]
Resources Article Resource Type Risk Management resources Virtual CISO blog Risk Management blog Blog
Unlocking the Potential: Exploring the Benefits of a vCISO
There is no doubt that the number of qualified and available cyber security experts is [...]
Blog Article Resource Type Risk Management resources Resources Virtual CISO blog Risk Management blog
Comparing a Virtual CISO vs. a Full-Time CISO
Most of us are aware that there is a huge gap of qualified cyber security [...]
Blog Risk Management blog Data Protection and Privacy blog Resources Risk Management resources Resource Type Article
Navigating PPI Principals of GDPR for Small Businesses
“So, all we have to do to implement these 11 chapters containing 91 articles in [...]
Blog Risk Management blog Data Protection and Privacy blog Resources GRC resources Resource Type Article
When to Kick Off a DPIA: 3 Key Triggers
Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing [...]
Blog Risk Management blog Data Protection and Privacy blog
Properly Deleting Personal Data the Right Way
Are you managing personal data deletion correctly under the DPA and GDPR? Does everyone in [...]
Data Protection and Privacy blog Blog Risk Management blog
Data Protection Officer Questions – Answered by a DPO
There are many questions about why a Data Protection Officer (DPO) is needed and what [...]
Blog Risk Management blog Data Protection and Privacy blog
Data Protection by Design and Default: A Clear Explanation
Previously known as ‘privacy by design’, “data protection by design and default” has always been [...]
Article Risk Management blog Data Protection and Privacy blog Resources GRC resources Resource Type Blog
When Must You Complete a Data Protection Impact Assessment?
Data protection impact assessments (DPIAs) are a legal requirement for GDPR, to ensure people’s private [...]
Supply Chain Risk Management blog Risk Management blog Blog
MOVEit Attack – Security Tool Vendors Have Failed Us… AGAIN!
2023 MOVEit Cyber Attack to Affect the Masses Yet again, here’s a prime example of [...]
Article Resource Type Resources Supply Chain Risk Management blog Risk Management blog Blog
Cyber Security Supply Chain Challenges in the Agrifood Industry
Guest Contributor: Benjamin Turner, Former Chief Operating Officer, Agrimetrics Shortly after Russia’s invasion of Ukraine, [...]
Article Resource Type Risk Management resources Resources Supply Chain Risk Management blog Risk Management blog Blog
Preventing Supply Chain Cyber Attacks: Key Strategies
“There has been a 742% average annual increase in software supply chain attacks over the [...]
Blog Article Resource Type Resources Supply Chain Risk Management blog Risk Management blog
Cyber Supply Chain Risk Management – Should Penetration Testing be Required?
Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and [...]
Blog Risk Management blog Awareness Training blog Resources Risk Management resources Resource Type Article
Get WFH Cyber Security at the Forefront of Staff’s Minds
Is your staff is staying resilient with protecting company information assets whilst Working from Home? [...]
Blog Risk Management blog Awareness Training blog
What Defines a Well-developed Security Awareness Program?
Good news. Bad news. The bad news is that cyber security threats to businesses are [...]
Article Resource Type Risk Management resources Resources Malware and Ransomware blog Risk Management blog Blog
How a Ransomware Readiness Assessment Can Protect Your Business
Ransomware is a type of malware that encrypts files and then seeks payment in exchange [...]
Resources Article Resource Type Risk Management resources Malware and Ransomware blog Risk Management blog Blog
What is Ransomware? Four Examples You Should Know About
By now we all know the effect a Ransomware attack can have on an organisation. [...]
Blog Article Resource Type Risk Management resources Resources Malware and Ransomware blog Risk Management blog
Outsmart the DarkSide Ransomware Group
The DarkSide Ransomware Group is one of the many gangs that continue to rebrand themselves [...]
Article Resource Type Resources Information and Cyber Security blog Risk Management blog Blog
How Do You Conduct an Information Security Risk Assessment?
Information security risk assessments are crucial for any businesses that deal with any sensitive information [...]
Risk Management blog Article Resource Type Resources Information and Cyber Security blog Blog
SaaS Security 101: Essential Strategies for Businesses
Software companies have naturally embraced the cloud. It provides countless benefits for their clients, ranging [...]
Blog Information and Cyber Security blog Risk Management blog
As a nation, are we cyber security aware?
In the following blog post, we are going to shine a spotlight on the general [...]
Blog Risk Management blog Incident Management blog Resources Resource Type Article
How to File a Data Breach Compensation Claim
What is a Data Breach Claim? “Someone stole my personal information and I want something [...]
Blog Risk Management blog Incident Management blog
How to Respond When Data Breaches Hit the Fan
Not many companies anticipate being the focal point of a significant data breach incident. However, [...]