Annabelle Graham Archive
2017 was a big year for data breaches. Uber, Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk. Using …
It has been revealed that Coca-Cola suffered a data breach in September 2017, but was asked not to disclose it by law enforcement while the incident was being investigated. The breach occurred when a former employee took a hard drive …
Staff at IBM have been banned from using removable storage devices, including USB sticks. Shamla Naidoo, IBM’s global chief information security officer, has said that the company “is expanding the practice of prohibiting data transfer to all removable portable storage …
General Data Protection Regulation (GDPR) compliance should be a priority and high on every organisation’s agenda with less than two months until the regulation comes into effect on 25 May 2018. Organisations need to be aware of what data they …
ISO 20000 is an IT service management (ITSM) standard that ensures an organisation’s ITSM processes are aligned with international best practice, as well as the needs of the organisation itself. This standard helps organisations benchmark how their managed services are …
Last week the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) released their annual report on the cyber threats facing UK businesses. The report examines how cyber activity has impacted UK businesses over the past 12 months …
If you’re looking to develop a career in information security, the CISMP training course is a great starting point. It provides a broad introduction to information security management upon which more technical qualifications can be built. CISMP is also suitable …
Many organisations choose to implement ISO 27001 as it demonstrates that they have put in place the best-practice information security processes. It is also the only international standard that defines the requirements of an information security management system (ISMS). An …
A risk assessment enables you to identify, analyse and evaluate your organisation’s risk. By identifying gaps between people, processes and technology, you can minimise and prepare for potential threats. Risk assessments are central to many standards, including ISO 27001, the …
Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the risk of a cyber attack increasing every year, how …