Julia Dutton Archive
Whether you like it or not, every business is a target for cyber attackers, and that includes yours. Data breaches are becoming more severe, yet many organisations still assume they will never suffer one. However, you should adopt a ‘when …
Do your research Ditch the jargon and learn how to implement an ISMS (information security management system) in nine steps with our free guide. We’ve also got a handy pocket guide – Nine Steps to Success – An ISO 27001 …
Most GDPR (General Data Protection Regulation) compliance projects start with a gap analysis. A gap analysis is a popular method of assessing compliance against the requirements of the Regulation. It’ll help you identify and prioritise the areas that you should …
Under the EU GDPR (General Data Protection Regulation), organisations must respond to a serious data breach within 72 hours of becoming aware of it. These reporting requirements place a significant burden on organisations. What is a data breach response plan? …
Since a no-deal Brexit is starting to look more and more likely, the UK government recently released additional guidance to supplement the ICO’s (Information Commissioner’s Office) previous description of the future data protection regime. The government has stated that it will …
The EU GDPR (General Data Protection Regulation) hasn’t been around for long but we’re already seeing a huge increase in reported data breaches to the ICO (Information Commissioner’s Office). In the past two years, the number of reported data breaches …
The NIS Regulations 2018 (The Network and Information Systems Regulations) are derived from the NIS Directive (the EU Directive on security of network and information systems), and took effect on 10 May 2018. What is the objective of the NIS …
To improve cyber risk governance among public-sector departments and their suppliers, the UK government has issued a series of minimum cyber security standards that will be incorporated into the Government Functional Standard for Security. The first standard to be incorporated, …
The Directive on Security of Network and Information Systems (NIS Directive) ((EU) 2016/1148) aims to achieve a high common level of network and information systems security across the European Union. IT Governance has prepared a free compliance guide based on …
Although data breaches as a result of cyber attacks get all the press, it is often negligence or a lack of basic processes, policies and procedures that result in data breaches. The ICO (Information Commissioner’s Office) compiles quarterly statistics about …