dcsimg

Cyber attacks and data breaches in review: October 2019

It was a mixed bag this month in terms of cyber attacks and data breaches. On the one hand, the 421,103,896 data records that were confirmed to have been compromised represents about half of the monthly average.  But on the other hand, the 111 incidents accounts for the highest monthly total this year.  As we do every month, let’s review some of the most notable incidents that took place in … [Read more...]

Further your career with certified ISO 27001 training

At IT Governance Europe, we believe that an ISO 27001 qualification is something that every cyber security professional should have. As such, we’ve made our ISO 27001 courses available in classrooms, online and in-house. These courses have been designed to teach attendees the skills required to plan, implement, maintain and audit a best-practice information security management system (ISMS) in … [Read more...]

GDPR-compliant organisations reaping the benefits, study finds

Organisations that meet the requirements of the GDPR (General Data Protection Regulation) experience a wide variety of benefits, according to a new Cisco report. The 2019 Data Privacy Benchmark Study demonstrates that GDPR compliance makes organisations less susceptible to data breaches, as you’d expect, but it also streamlines business processes and helps win … [Read more...]

A quick guide to the GDPR’s data breach notification requirements

One of the biggest talking points of the GDPR (General Data Protection Regulation) is its data breach notification requirements. The rules, which include a strict 72-hour deadline for reporting incidents, have caused many organisations to question how they could possibly comply, and many will be tempted to put off their duties and deal with data breaches if and when the time comes. But make no … [Read more...]

How to document your information security policy

Information security policies play a vital role in organisational security. Getting your policy right will give you an excellent framework to build on, making sure that all your efforts follow a single goal. But if you get it wrong, you risk neglecting key issues and exposing yourself to data breaches. To make sure you get off on the right track, we’ve taken some advice from Alan Calder and … [Read more...]

How to stay cyber secure over the Christmas period

Christmas is the worst time of the year for your organisation to suffer a data breach. Not only is it morale-sapping, it also means employees will have to work long hours to investigate the incident and recover whatever information it can.  And, of course, the financial costs of a data breach may result in holiday bonuses being a lot smaller than you might have anticipated, with future targets … [Read more...]

7 tips to help you implement a GDPR staff awareness training programme

Staff awareness training is an essential component of the GDPR (General Data Protection Regulation), but do you know how it works in practice? Here are seven things you can do to make your awareness programme a success. Consider your requirements There isn’t a ‘one-size-fits-all’ approach for staff awareness training. Every organisation needs to tailor its programme according to several … [Read more...]

5 tools that help you comply with the GDPR and mitigate the risk of data breaches

Understanding and implementing the GDPR’s requirements can be tough, but you can make your life easier with these tools. It’s more important than ever to ensure you have strong data protection practices. Not only is the threat of cyber crime on the rise but there’s also the potential for severe disciplinary action under the GDPR (General Data Protection Regulation). The GDPR’s strict requirements … [Read more...]

How to write a GDPR data breach notification procedure

Documenting your GDPR compliance can be tough, but a little guidance and access to documentation templates can make things much easier. You probably found the documentation process one of the most stressful parts of EU GDPR (General Data Protection Regulation) compliance. What you write forms the backbone of your data protection practices, but there’s very little guidance on exactly what you … [Read more...]