This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:

Data breach reporting: describing the impact and its potential consequences

What are the breach’s potential consequences? Has there been any harm to data subjects as a result of the breach?

Establishing how much damage a breach has caused can be difficult, even for a seasoned information security expert.

However, following a proven risk assessment process and framework will help you not only identify and assess the various risks you face, but also establish the potential impact of those risks on the confidentiality, integrity and availability of the data – as required by the EU GDPR (General Data Protection Regulation).

Save up to 20% with our Breach Essentials Bundles

Minimise and effectively assess your data breach risk with our range of tailored bundles designed to help you at every stage of the data breach readiness cycle – from threat detection and prevention to protection, response and recovery solutions.

Find out more

Discover our range of solutions

Plan ahead with our range of risk assessment products and services


Software

vsRisk™- Risk Assessment Tool

Risk assessment is at the heart of information security best practice, as set out in the international standard ISO 27001.

Suitable for organisations of all sizes, vsRisk™ is a leading information security risk assessment tool that helps you conduct fast, accurate, auditable and hassle-free risk assessments year after year. Fully aligned with ISO 27001, it significantly cuts the consultancy costs typically associated with an information security risk assessment. The tool is available on an online platform or as desktop software.

Find out more

Consultancy

GDPR Data Protection Impact Assessment (DPIA) service

Data protection impact assessments (DPIAs) under the GDPR are mandatory for any new personal data processing operations that are likely to result in a high risk to the rights and freedoms of individuals. Our DPIA service provides an on-site assessment of the data protection risks associated with a new or existing single data processing operation within your organisation and recommendations on the appropriate controls to mitigate these risks.

Find out more


Business continuity management consultancy

BCM is a form of risk management that deals with the threat of business activities or processes being interrupted by external and/or internal factors. It involves making arrangements to ensure you can respond as effectively as possible in the event of a disruption so mission-critical functions will continue to provide an acceptable level of service.

Our consultancy team will help you implement a robust business continuity management programme with minimal business disruption and within a limited budget.

Find out more

Documentation Toolkit

Business Continuity Management Documentation Toolkit

A complete set of easy to use, customisable documentation templates to enable you to plan for incidents and deploy a business continuity management (BCM) programme in line with the principles of ISO 22301, the international standard for BCM best practice.

Find out more

Certificated training on assessing risks

ISO 27005 Risk Management Training Course

Learn how to conduct an ISO 27001-compliant risk assessment from start to finish in just three days through practical risk management methodologies as promoted by ISO 27005 with this training course.

Find out more

Further reading and learning