Five free compliance resources for information security professionals


In today’s complex regulatory environment, and with increasing scrutiny of their information security and data protection practices, organisations cannot afford to be complacent. This puts more pressure on those individuals within the organisation who are responsible for ensuring information is safe and compliance is maintained. Here are five free resources that can help information security […]

Five reasons to choose the ISO 27001 Documentation Toolkit


Implementing the global information security standard ISO 27001 is a great way of protecting your information assets. Creating an information security management system (ISMS) aligned with the Standard will help you build robust cyber defences, improve how you manage data and help you meet your compliance obligations. The most complex part of any ISO 27001 […]

Don’t have an information security awareness programme? You’re not alone


Phishing scams, dodgy attachments, weak passwords, websites without security certificates, using your mobile for work purposes… the list of potential sources for security breaches is endless. When it comes to information security, do you know what your role is, and what you should or shouldn’t be doing? Does your business have an information security awareness […]

Only 25% of directors are actively involved in reviewing security and privacy risks

Side view of two blurred businessmen talking in conference room

PwC’s 2015 Global State of Information Security Survey reveals that 50% of organisations now have cyber insurance to protect themselves against cyber risks and the misuse of personal data. This statistic supports the commonly accepted view that cyber risks will only continue to increase in potency and impact. In fact, the number of respondents that […]

Why have CompTIA qualifications become so important?

businessman with laptop in network server room

Just like producing a fine wine, it can take a long time for an IT qualification to become recognised and valued by individuals and employers.  This is not a bad thing, as the IT industry has historically been littered with ‘print your own certificate’ schemes that are not worth the paper they are written on. […]

Employees are the most-cited culprits of infosec incidents


According to PwC’s Global State of Information Security® Survey 2015, employees have become the most-cited culprits of information security incidents – whether intentionally or not. The percentage of respondents who pointed at current employees as the cause for incidents has jumped by 10% since 2013. Moreover, 32% of the respondents of the 2014 US State […]

Having a ‘head for business’ essential for information security


In this interview we talk to Maldar Ali, Information Security Risk Leader of EMEA at a leading financial services firm in the United Kingdom.  1. Maldar, welcome and thank you for participating in this interview. What do you believe is the biggest threat to information security today? There are many threats, such as APTs, but I […]

Ignorance responsible for 70% of staff-related breaches

Handsome Business Man in Suit with Surprised Expression

Phishing attacks remain a serious concern for organisations around the world.  No matter how much an organisation invests in firewalls, antivirus software or malware protection, all too often the weak link in the security chain is the human element. Employees are increasingly becoming the hapless targets of elaborate phishing scams, and the volume of such […]

Phone evidence remotely wiped in police stations


Expert recommends putting phones in a microwave to prevent RF signals from activating ‘kill switch’ function.   Tablet and smartphone remote wipe functions have been used by criminals to wipe mobile devices that were seized by officers and secured in police stations. BBC News has reported that Cambridgeshire, Derbyshire, Nottingham and Durham police have all […]

The information security analyst: An interview with Stuart Ritchie-Fagg


In this interview we talk to Stuart Ritchie-Fagg, senior information security analyst. Stuart, welcome and thank you for participating in this interview.  How did you decide to embark on a career in information security?  Well, security really decided upon me.  My background was always fundamentally administration within business operations, and an opportunity arose to break […]