This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:

Data breach reporting: describing the impact and its potential consequences

What are the breach’s potential consequences? Has there been any harm to data subjects as a result of the breach?

Establishing how much damage a breach has caused can be difficult, even for a seasoned information security expert.

However, following a proven risk assessment process and framework will help you not only identify and assess the various risks you face, but also establish the potential impact of those risks on the confidentiality, integrity and availability of the data – as required by the EU GDPR (General Data Protection Regulation).


Discover our range of solutions

Plan ahead with our range of risk assessment products and services

Software


vsRisk™- Risk Assessment Tool

Risk assessment is at the heart of information security best practice, as set out in the international standard ISO 27001.

Suitable for organisations of all sizes, vsRisk™ is a leading information security risk assessment tool that helps you conduct fast, accurate, auditable and hassle-free risk assessments year after year. Fully aligned with ISO 27001, it significantly cuts the consultancy costs typically associated with an information security risk assessment. The tool is available on an online platform or as desktop software.


Consultancy


GDPR Data Protection Impact Assessment (DPIA) service

Data protection impact assessments (DPIAs) under the GDPR are mandatory for any new personal data processing operations that are likely to result in a high risk to the rights and freedoms of individuals. Our DPIA service provides an on-site assessment of the data protection risks associated with a new or existing single data processing operation within your organisation and recommendations on the appropriate controls to mitigate these risks.


Business continuity management consultancy

BCM is a form of risk management that deals with the threat of business activities or processes being interrupted by external and/or internal factors. It involves making arrangements to ensure you can respond as effectively as possible in the event of a disruption so mission-critical functions will continue to provide an acceptable level of service.

Our consultancy team will help you implement a robust business continuity management programme with minimal business disruption and within a limited budget.


Documentation Toolkit


Business Continuity Management Documentation Toolkit

A complete set of easy to use, customisable documentation templates to enable you to plan for incidents and deploy a business continuity management (BCM) programme in line with the principles of ISO 22301, the international standard for BCM best practice.


Certificated training on assessing risks


ISO27005 Risk Management Training Course

Learn how to conduct an ISO 27001-compliant risk assessment from start to finish in just three days through practical risk management methodologies as promoted by ISO 27005 with this training course.


Further reading and learning

Free PDF download: Risk Assessment and ISO 27001

For more information on how to conduct an information security risk assessment, download our free green paper - Risk Assessment and ISO 27001.

Find out more

Webinar: Five steps to conducting a risk assessment

Learn about the key components of effective risk management

Find out more


Are you on track with your #BreachReady project?

To help you on your journey, we’re offering a discount on all our data breach solutions for a limited period. Don't fall victim - get #BreachReady today. (Terms and conditions apply.)

 
 

Speak to an expert

Understand the risk that your organisation faces and speak to one of our experts today.