ProtectComplyThrive
IT Governance Blog
  • About Us
  • Visit our Webshop
  • Menu
  • Blog Home
  • Cyber Security
    • Business Continuity
    • Cyber Essentials
    • Cyber Resilience
    • ISO 27001
    • NIS Regulations
    • Risk Management
    • PCI DSS
  • Breaches and Hacks
  • Privacy
    • Data Protection
    • EU GDPR
  • Sectors
    • Education
    • Financial Services
    • Healthcare
    • Professional Services
    • Retail
  • Other Blogs
    • Book Reviews
    • Podcast
    • Staff Awareness

Catches of the month: Phishing scams for March 2021

Luke Irwin 3rd March 2021 Catches of the Month
The Royal Mail is used in so many scams that it has a specific section on its website to help people detect and report fraudulent messages. That service has been especially busy recently after people received emails and texts supposedly …
[Continue Reading...]

List of data breaches and cyber attacks in February 2021 – 2.3 billion records breached

Luke Irwin 1st March 2021 Monthly Data Breaches and Cyber Attacks
Monthly data breach blog cover - February
The cyber security industry was rocked in February after a ransomware attack against the Cloud service provider Accellion. Dozens of organisations that used the software reported incidents in one of the worst months we’ve ever recorded. We found 118 publicly …
[Continue Reading...]

What are the best books on data privacy?

Luke Irwin 25th February 2021 Data Protection
Looking for affordable ways to keep your data secure? Sometimes the simplest solutions are the best – and nothing beats the simplicity of a book. With books, you get expert advice at your fingertips. You can study whenever is convenient …
[Continue Reading...]

List of free GDPR resources and templates

Luke Irwin 25th February 2021 EU GDPR
Since the GDPR (General Data Protection Regulation) came into effect in May 2018, organisations have been required to keep a close eye on the way they process and protect EU residents’ personal data. The Regulation is filled with so many …
[Continue Reading...]

Organisations turn the tide on ransomware attackers

Luke Irwin 22nd February 2021 Ransomware
Ransomware has become one of the most common and profitable forms of cyber crime, but there’s an obvious fact that is neglected: the attacks are only worthwhile if the victim chooses to pay up. Of course, it’s easy to say …
[Continue Reading...]

Personal data vs. sensitive data: what’s the difference?

Luke Irwin 18th February 2021 EU GDPR
Data protection law in the UK has changed as a result of Brexit. You can find the latest guidance here. At the heart of the GDPR (General Data Protection Regulation) is the concept of ‘personal data’. But what constitutes personal …
[Continue Reading...]

TikTok breaching users’ rights “on a massive scale”, says European Consumer Group

Luke Irwin 17th February 2021 News
TikTok has been accused of breaching users’ rights “on a massive scale” by the European Consumer Group. It is the latest warning for the video sharing app, which has faced numerous complaints over its lax copyright policy and its inability …
[Continue Reading...]

How to create an ISO 27001 secure development policy – with template

Luke Irwin 16th February 2021 ISO 27001
Organisations that implement ISO 27001 must write a secure development policy. The requirements for doing this are outlined in Annex A.14 of the Standard: System acquisition, development and maintenance. In this blog, we explain how you can use ISO 27001’s …
[Continue Reading...]

World Economic Forum: cyber crime is one of the “key threats of the next decade”

Luke Irwin 15th February 2021 News
A WEF (World Economic Forum) report lists cyber crime alongside COVID-19, climate change and the debt crisis as the biggest threats facing society in the next decade. Its 2021 Global Risks Report says cyber attacks pose a bigger immediate risk …
[Continue Reading...]

5 ways to improve your information security in 2021

Luke Irwin 11th February 2021 ISO 27001
Protecting your organisation against cyber attacks can sometimes feel like a never-ending game of security whack-a-mole. As soon as you’ve secured one weakness, another one appears. This can demoralise any organisation and make them believe that good information security practices …
[Continue Reading...]
  • ← Older posts

    Social Media

    Categories

    • Catches of the Month
    • Cyber Security
      • Business Continuity
      • Cyber Essentials
      • Cyber Resilience
      • ISO 27001
      • IT Governance
      • NIS Regulations
      • PCI DSS
      • Penetration Testing
      • Risk Management
    • IT Best Practice
      • ITIL/ITSM/ISO 20000
      • Project Management
    • Monthly Data Breaches and Cyber Attacks
    • News
    • Other Blogs
      • Book Reviews
      • Podcast
    • Phishing
    • Privacy
      • Breaches and Hacks
      • Data Protection
      • EU GDPR
        • #BreachReady
    • Ransomware
    • Scotland
    • Sectors
      • Education
      • Financial Services
      • Healthcare
      • Professional Services
      • Public Sector
      • Retail
    • Secure Together
    • Staff Awareness
    • Training
    • Uncategorised
IT Governance UK Blog Copyright © 2021.