Cyber Security Free Resources

 

Bolton (Cyber Health Check)

Download this case study to see how a market research firm achieved a higher level of confidence in its security posture with IT Governance’s Cyber Health Check.

Download now

Lannister (Cyber Security Audit)

Download this case study to learn how IT Governance helped senior management develop a strategy for managing cyber security after the firm suffered a data breach that compromised 50,000 customer accounts.

Download now

Martell (Cyber Incident Response Management)

Download this case study to see how IT Governance assisted in the development of the cyber incident response process and action plan in the wake of several high-profile cyber attacks.

Download now

Tully (SOC 2 Audit Readiness Assessment)

This case study outlines how IT Governance conducted a readiness assessment and developed a roadmap of recommendations to help this firm achieve compliance with the requirements of the SOC 2 TSP.

Download now

 

Assured Security – Getting cyber secure with penetration testing

Assured Security – Getting cyber secure with penetration testing

Download this green paper now and find out how to keep your business secure and safe from a cyber attack with effective penetration testing.

Download now

Cyber Security 101 – A guide for SMEs

Cyber Security – An issue for the board

Download this free paper to understand hwo ISO 27001 and ISO 22301 can help directors and their organisations manage cyber security and resilience effectively.

Download now

Cyber Security and ISO 27001 – Addressing the cyber threat landscape

Cyber Security 101 – A guide for SMEs

Looking for an introduction to cyber security? Download ‘Cyber Security 101 – A guide for SMEs’ to find out how to get started with the basics of cyber security while keeping costs at a minimum.

Download now

Remote Working – Managing cyber security and data privacy risks

Cyber Security and ISO 27001 – Addressing the cyber threat landscape

Download this green paper now to learn how smart organisations are protecting their reputations and critical information assets while winning new business with ISO 27001 certification. 

Download now

Remote Working – Managing cyber security and data privacy risks

Remote Working – Managing cyber security and data privacy risks

A remote workforce brings its own security issues, from a reliance on personal devices and lack of corporate control over their configuration. Download our free guide to learn how to manage your remote workforce’s data privacy and cyber security risks.

Download now

Cyber Incident Response Management – An introduction

Cyber Incident Response Management – An introduction

Effective cyber incident response (CIR) management can reduce the risk of future cyber attacks and data breaches occurring. Learn more about CIR management from the experts in this free green paper.

Download now

 

12 Cyber Security Questions to Ask Your CISO

12 Cyber Security Questions to Ask Your CISO

Our team of cyber security experts have identified the top 12 questions that you need to ask your CISO to ensure all areas of cyber security are covered, and will discuss them in this brochure.

Download now

Cyber Essentials for SMEs

Cyber Essentials for SMEs

Many SMEs underestimate the threat posed by cyber attacks and many cannot afford the reputational damage. Download this free brochure to discover why criminal hackers prey on SME's.

Download now

Cyber Health Check – Uncover your cyber security weak spots before attackers do

Cyber Health Check – Uncover your cyber security weak spots before attackers do

IT Governance can help you identify your weakest security areas and take appropriate action by following our practical recommendations in this brochure.

Download now

12 Cyber Security Questions to Ask Your CISO

Cyber Security Risk Scorecard

Download our free Cyber Security Risk Scorecard and answer 21 key questions to get an indication of your organisation’s overall level of cyber security risk.

Download now

Cyber Essentials – A guide to the scheme

Cyber Essentials – A guide to the scheme

For further information about the Cyber Essentials scheme and how it can help you protect yourself against the most common cyber threats, download this guide.

Download now

 

14 Cyber Security Statistics for SMEs

14 Cyber Security Statistics for SMEs

Many SMEs believe that only large organisations are targeted by cyber criminals. Our free infographic demonstrates this risk, as it highlights 14 cyber security statistics for SMEs.

Download now

List of data breaches in 2017

List of data breaches in 2017

2017 was a big year for data breaches. Using the findings of our monthly ‘list of data breaches and cyber attacks’ blog posts, we’ve created an infographic that summarises reported data breaches from 2017.

Download now

List of data breaches in 2018

List of data breaches in 2018

2018 saw some of the biggest data breaches yet. Using our monthly ‘List of data breaches and cyber attacks’ blog posts, we’ve created an infographic to sum up the reported data breaches of 2018.

Download now

List of data breaches in 2019

List of data breaches in 2019

2019 was a colossal year for data breaches, using our monthly ‘List of data breaches and cyber attacks’ blog posts, we’ve created an infographic that that summarises and breaks down the reported data breaches of 2019.

Download now

Top 5 remote working cyber security tips

Top 5 remote working cyber security tips

Hastily deployed remote working arrangements have introduced critical risks during the COVID-19 lockdown. We’ve compiled a list of the top 5 remote working cyber security risks you should be aware of.

Download now

title

Working from home top tips

We’ve rounded up a selection of useful tips from IT Governance employees and our security experts on how you can get used to working from home, and keep cyber secure. 

Download now

What are the major types of cyber attack?

What are the major types of cyber attack?

With cyber threats constantly evolving, cyber security can be a complex undertaking. Download our free infographic to learn more about the major types of cyber attacks. 

Download now

What is ransomware and how can I protect my business?

What is ransomware and how can I protect my business?

Ransomware is a type of malicious programme that demands payment after launching a cyber attack on a computer system. For a quick guide to ransomware and what you can do to protect your business, download our free infographic.

Download now

Minimise the risk of phishing attacks by assessing and educating end users

Minimise the risk of phishing attacks by assessing and educating end users

Phishing is a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware. Download our free infographic for more information on phishing, types of phishing attacks and more.

Download now

 

Upcoming cyber security webinars

Cyber threats and the risks they pose to SMEs

Date: Thursday, 17 September 2020

Time: 3:00 – 3:45 pm

Presenter: Geraint Williams, CISO, GRC International Group

With 60% of small and medium-sized organisations globally closing their doors within 12 months of suffering a major cyber attack, cyber security awareness is vital to their survival.

Addressing complex security issues can be challenging for SMEs. It is essential to ensure your organisation does not waste time and resources, while reducing the likelihood of underestimating or overlooking risks that could cause significant damage.

Read more

Cambridgeshire against Cyber Crime: 7 cyber security risks and how to overcome them

Date: Thursday, 1 October 2020

Time: 3:00 – 3:45 pm

As a hub for organisations delivering digital innovation and leading-edge solutions in technology, medicine and telecommunications, Cambridgeshire is considered the ‘Silicon Fen’ of the UK. It is also a cyber crime hotspot.

In a recent data analysis of 20 UK regions, the ONS (Office for National Statistics) revealed that Cambridgeshire suffered the sharpest increase in cyber crime between 2016 and 2018, with the number of cases escalating by 49% (from 2,789 to 4,155).

The COVID-19 pandemic has exacerbated the problem, with cyber crime levels rising exponentially during lockdown as criminals targeted remote workers with phishing, scams and malware.

Read more

Cyber security and the human threat: what SMEs can do

Date: Thursday, 15 October 2020

Time: 3:00 – 3:45 pm

Presenters:

  • Geraint Williams, CISO, GRC International Group
  • Stefanie Retfalvi, Principal Consultant, Learning Design, IT Governance

At the start of the COVID-19 pandemic, as more staff transitioned to remote working, cyber security experts cautioned organisations about their reduced ability to detect and contain cyber incidents, advising them to implement further security measures. IBM’s Cost of a Data Breach Report 2020 backs their claims, suggesting that where employees work from home, the cost of a data breach increases by $137,000 (about £104,000).

Addressing the human element of cyber security is key to an organisation’s survival. The NCSC (National Cyber Security Centre) says that more than 60% of small and medium-sized organisations globally that suffer a major cyber attack close their doors within 12 months. It’s therefore vital that organisations – and their staff – know how to recognise and respond to an incident.

Read more

Cyber incident response readiness for SMEs

Date: Thursday, 12 November 2020

Time: 3:00 – 3:45 pm

Presenters: Geraint Williams, CISO, GRC International Group

According to IBM’s Cost of a Data Breach Report 2020, it takes an average of 280 days to identify and contain a breach. The average total cost of a breach now stands at $3.86 million (about £2.94 million), but the report suggests that organisations that have implemented a cyber incident response plan to identify and contain the impact of a cyber incident within 200 days can reduce their financial damage by $1.12 million (about £770,000).

Read more

On-demand cyber security webinars

Online panel discussion – COVID-19 – Risks and opportunities post-lockdown

With restrictions to contain the COVID-19 pandemic easing and the world coming out of lockdown, many organisations are now preparing for a phased return to work.

As the lockdown comes to an end, organisations will inevitably face increased pressure to take the necessary measures to handle privacy and cyber risks – and to avoid fines for non-compliance – as they re-establish operations.

Read more

Online panel discussion – COVID-19 Cyber Risk and Data Privacy Response

The sudden global shift to remote working has brought unprecedented changes to social and work habits, and introduced new cyber risks and data privacy challenges that affect the way organisations need to operate.

As most employees are working from home, they may be accessing and processing information outside the organisation’s normal security perimeter, which increases the risk of a data breach. With cyber criminals employing sophisticated phishing tactics and malicious websites to target staff by impersonating credible information sources around COVID-19, organisations need to implement security measures to address these challenges.

Read more

Managing cyber security and privacy risks with inadequate resources

 

The multi-faceted aspects of cyber security risks and data privacy regulations have led to an increased demand for scarce cyber security skills.

With the cyber security skills gap continuing to increase, many organisations are struggling to find the expertise they need to address their cyber security challenges.

Read more

Surviving tomorrow’s cyber-attacks: resilience and cost-reduction

Initiating a cyber resilience strategy requires identifying the high-value assets within your organisation and their associated risks to strategically target areas for improvement. This webinar will help you understand how to start building cyber resilience.

Read more

Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotland and the rest of the UK

Cyber attacks are increasing in frequency and severity to such an extent that it’s no longer enough to trust that you can defend against every potential attack. Statistics suggest that it is inevitable that your organisation will suffer a data breach.

Read more

Cyber incident response management webinars on demand

Cyber incident response management: an essential tool for the GDPR and NIS Directive

 

The first webinar in the series explains general incident response concepts. It focuses on the importance of incident response within the General Data Protection Regulation (GDPR) and Directive on security of network and information systems (NIS Directive (now transposed in UK law as the NIS Regulations 2018)) frameworks and delivers an overview of the CIRM process.

Read more

Cyber incident response management: what you need to know

The second webinar focuses on the incident response process itself. It explains the terminology used and presents and describes different types of cyber attacks to give a clearer understanding of how vulnerabilities are exploited and what strategies are used to minimise risk.

Read more

Cyber incident response management: planning and implementation

The third and final webinar deals with incident response planning consideration and implementation, and the reporting requirements of the incident response system.

Planning is based on an organisation’s infrastructure topology and risk exposure, and implementation entails the development of an incident response team and test scenarios.

Report generation is the end product of the incident response process. It provides the audit trail details of an incident and is a requirement of all major regulatory frameworks and compliance standards.

Read more

This website uses cookies. View our cookie policy
WIN £100