5 PCI hurdles you need to overcome
When clients come to us for help with their PCI compliance project, they’re normally at a loss. And no wonder, when you consider these five hurdles: All the requirements are mandatory All 300 PCI DSS...
View ArticleHow to streamline your business processes into one manageable system
Organisations certified to an ISO standard are expected to implement and maintain a management system that not only meets the requirements of the standard involved, but also improves business...
View Article95% of organisations face significant challenges when implementing cyber...
According to ‘Cybersecurity Frameworks and Foundational Security Controls: A Survey of IT Security Professionals’, almost all organisations face significant challenges when implementing cyber security...
View ArticleRolls-Royce to pay £671m in bribery settlement
A UK court ruled last month that the UK-based engineering conglomerate Rolls-Royce must pay £671 million in order to settle corruption cases out of court. “We have co-operated fully with the...
View Article“Utterly corrupt” banker and five others found guilty of bribery and fraud
Six people, including two former managers with HBOS, were last week sentenced to a combined 47 years in jail for bribery and fraud. Lynden Scourfield pleaded guilty to six counts, including corruption,...
View ArticleCyber attack is top business continuity threat
Cyber attack is the top threat organisations are concerned about, according to the BCI Horizon Scan Report 2017. 88% of the 726 organisations that responded to the survey reported being “extremely...
View ArticleGDPR: How does your organisation measure up?
With the GDPR being enforced from 25 May 2018, organisations should be looking to kick-start their projects now. To help organisations assess their current stance against the Regulation and get their...
View Article3 approaches to tackling ISO 27001 documentation
For many organisations, the documentation stage is the most time-consuming part of their ISO 27001 project. For some, documenting an ISMS (information security management system) can take up to 12...
View ArticleVerizon’s 2017 Data Breach Investigations Report
It is the most highly anticipated cyber security report of the year and, for the tenth year running, Verizon has released its annual Data Breach Investigations Report (DBIR). The report is based on...
View ArticleTop 5 reasons you should be considering ISO 27001
ISO 27001 is the international standard that states best practice for an information security management system (ISMS). The standard is applicable to all organisations irrespective of their size, type...
View Article