ProtectComplyThrive
IT Governance Blog
  • About Us
  • Visit our Webshop
  • Menu
  • Blog Home
  • Cyber Security
    • Business Continuity
    • Cyber Essentials
    • Cyber Resilience
    • ISO 27001
    • NIS Regulations
    • Risk Management
    • PCI DSS
  • Breaches and Hacks
  • Privacy
    • Data Protection
    • GDPR
  • Sectors
    • Education
    • Financial Services
    • Healthcare
    • Professional Services
    • Retail
  • Podcast
  • Staff Awareness

Pro-Russian Criminal Hackers Target the Eurovision Song Contest

Luke Irwin 19th May 2022 News
The Italian police force announced this week that it thwarted a cyber attack on the Eurovision Song Contest. The competition, which took place in Turin last Saturday, is ostensibly an opportunity for European countries to demonstrate the best (or worst) …
[Continue Reading...]

What is a Cyber Security Audit and Why is it Important?

Luke Irwin 17th May 2022 Cyber Security
Cyber security audits are a vital component of an organisation’s defences against data breaches and privacy violations. By probing organisations’ systems and services, an auditor can identify security weaknesses, and determine whether their practices comply with relevant laws, such as …
[Continue Reading...]

What is Vulnerability Management under ISO 27001?

Luke Irwin 12th May 2022 ISO 27001
Vulnerability management is the practice of identifying and addressing the weaknesses in an organisation’s systems. The process is an essential part of information security and is discussed in ISO 27001, the international standard that describes best practice for implementing an …
[Continue Reading...]

Catches of the Month: Phishing Scams for May 2022

Luke Irwin 10th May 2022 Catches of the Month
Welcome to our May 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over their personal data. This month, we look at a scam …
[Continue Reading...]

Why You Should Care About World Password Day

Luke Irwin 5th May 2022 News
“My password was hacked”: it’s one of the oldest excuses in the book for people who post something regrettable online. But it’s also a growing reality, with Verizon’s 2021 Data Breach Investigations Report discovering that 61% of all data breaches …
[Continue Reading...]

List of data breaches and cyber attacks in April 2022 – 14.3 million records breached

Luke Irwin 3rd May 2022 Monthly Data Breaches and Cyber Attacks
Welcome to our latest monthly review of data breaches and cyber attacks. We discovered 80 security incidents in April, resulting in 14,329,785 compromised records. You can find the full list of data breaches below, with incidents affecting UK organisations listed …
[Continue Reading...]

Coca-Cola Investigating Claims that a Ransomware Gang Stole Sensitive Data

Luke Irwin 28th April 2022 News, Uncategorised
The Stormous ransomware gang announced earlier this week that it had hacked Coca-Cola and stolen 161 gigabytes of data. The group have put the information up for sale on the dark web, requesting just over $64,000 (about £51,000) in bitcoin. …
[Continue Reading...]

3 reasons cyber security training is essential

Luke Irwin 27th April 2022 Cyber Security, Training
Organisations are always looking for ways to improve their security practices, and one of the most effective ways to achieve this is by providing employees with cyber security training. A Lucy Security study found that 96% of respondents agreed that a …
[Continue Reading...]

How to Write an ISO 45001 Risk and Opportunity Register

Luke Irwin 26th April 2022 Uncategorised
Although it’s not a formal requirement of ISO 45001, a risk and opportunity register is a useful tool for organisations looking to bolster the health and safety of their workplace. The Standard describes best practices for occupational health and safety, …
[Continue Reading...]

What are the best qualifications for cyber security in 2022?

Luke Irwin 20th April 2022 Cyber Security, ISO 27001, Training
There has never been a better time to start a career in cyber security. Organisations’ reliance on IT technical solutions has only increased with the switch to remote working, creating a massive demand for qualified personnel. But what qualifications do …
[Continue Reading...]
  • ← Older posts

    Social Media

    Categories

    • Catches of the Month
    • Cyber Essentials
    • Cyber Resilience
    • Cyber Security
      • Business Continuity
      • NIS Regulations
      • Risk Management
    • GDPR
    • ISO 27001
    • IT Best Practice
    • Microsoft Security
    • Monthly Data Breaches and Cyber Attacks
    • News
    • PCI DSS
    • Penetration Testing
    • Phishing
    • Podcast
    • Privacy
      • Breaches and Hacks
      • Data Protection
    • Project Management
    • Ransomware
    • Sectors
      • Education
      • Financial Services
      • Healthcare
      • Professional Services
      • Public Sector
      • Retail
    • Staff Awareness
    • Training
    • Uncategorised
IT Governance UK Blog Copyright © 2022.