Julia Dutton Archive
An ISO 27001-compliant ISMS requires ongoing maintenance and review to meet the Standard’s requirements in clauses 8 and 9. The internal audit is an essential element of this process that must be carried out as described in clause 9.2 of …
It’s a common misconception that cyber security is all about technology (hardware and software). Technology is obviously a massive part of cyber security, but alone it is not enough to protect you from modern cyber threats. Cyber security consists of technologies, …
A spambot going by the auspicious name of Onliner Spambot has compromised 711 million email addresses and passwords. This was discovered when security researcher Benkow came across a web server that hosts text files containing email addresses, passwords and email …
Organisations have until 25 May 2018 to comply with the EU General Data Protection Regulation (GDPR). Those who have studied the Regulation will be aware that there are many references to certification schemes, seals and marks. The GDPR encourages the …
When assisting clients with General Data Protection Regulation (GDPR) compliance projects we are often asked why they should consider implementing an information security management system (ISMS) instead of simply implementing a range of technical controls, in order to comply with …
Ponemon Institute’s 2017 Cost of Data Breach Study: Impact of Business Continuity Management (BCM), reveals that BCM programmes “can reduce the per capita cost of a data breach, the mean time to identify and contain a data breach and the …
Reckitt Benckiser, the maker of Durex, Dettol and Nurofen products, has revealed that its manufacturing and distribution divisions were affected by the NotPetya ransomware attack last month, leaving it unable to fulfil some of its customers’ orders. The consumer goods …
With data security concerns moving to the top of the corporate risk agenda, organisations are seeking better ways of controlling the key security risks in their supply chain. This is especially true for complex supply chains, which can span multiple …
A parliamentary report released this month on the protection of personal data online (Cyber Security: Protection of Personal Data Online) recommends several tough new corporate measures and – in our view very valid – suggestions to improve the cyber security …
A Big Brother Watch report (Safe in Police Hands?), released this month, reveals that UK police forces suffer close to ten data breaches every week. The report states that “between June 2011 and December 2015 there were at least 2,315 …