dcsimg

Summer offers to kick-start your cyber security journey. Don’t miss out! 

IT Governance is a leading global provider of IT governance, risk management and compliance solutions, with a special focus on cyber resilience, data protection, the PCI DSS (Payment Card Industry Data Security Standard), ISO 27001 and cyber security.  We are committed to helping organisations protect themselves and their customers from the perpetually evolving range of cyber threats. Our deep … [Read more...]

The GDPR: How to send sensitive information by email

Organisations always have to worry about the security of the information they send by email. You can never be certain who has access to your messages, and everyone has probably been guilty at least once of sending a message to the wrong person or accidentally hitting ‘reply all’.  Your misdelivered message might have only contained mundane chatter and left you feeling embarrassed. However, if your … [Read more...]

Are you #BreachReady?

It seems like we hear about yet another data breach on a daily basis, with recognised companies such as Ticketmaster and Dixons Carphone – to name but a few – suffering at the hands of criminal hackers. If you think it only happens to large organisations, think again Since the EU’s GDPR (General Data Protection Regulation) came into effect in May, the DPC (Data Protection Commissioner) has dealt … [Read more...]

Finding the right candidate to be your DPO

Complying with the EU GDPR (General Data Protection Regulation) is mostly about hard work and organisation, but there’s also a little bit of luck involved – at least when it comes to appointing a DPO (data protection officer). The position, which is mandatory for many organisations under the GDPR, has caused a massive spike in demand for data protection experts. Unless the perfect candidate falls … [Read more...]

Is your organisation tackling cyber security the right way?

Most organisations’ cyber security defences aren’t good enough. How could they be? Even with unlimited money and staff, it is practically impossible to address the constantly emerging and evolving threats. There are unpatched systems, potential malware infections, the threat of large-scale attacks and any number of vulnerabilities that employees bring with them, from weak passwords to … [Read more...]

Are you prepared for an information security breach?

Data breaches are a massive problem for all organisations. In its latest Data Breach Level Index, digital security company Gemalto found that, in 2017, more than 2.6 billion records were compromised in publicly disclosed data breaches. This is the equivalent of more than 7 million records per day, or 82 records per second.  Despite this, there’s a lot of hope for the future. The increased media … [Read more...]

Who requires a DPO?

As of 25 May 2018, the EU GDPR (General Data Protection Regulation) is the primary piece of legislation governing data protection. The requirement for Irish organisations to register their data processing activities with the DPC (Data Protection Commission), which existed under the previous regime, no longer applies. However, under the GDPR, certain organisations are required to appoint a DPO … [Read more...]

IT Governance offers GDPR training courses across Europe

With the EU GDPR (General Data Protection Regulation) now in effect and organisations desperate for experts, IT Governance is pleased to announce that it will be running 91 GDPR training courses across Europe over the next year.  Whether you’re interested in our Foundation or Practitioner training course, we hope we’re able to bring our expertise to a location near you.  Certified EU GDPR … [Read more...]

The DPO role and why you should consider outsourcing it

Under the EU GDPR (General Data Protection Regulation), which came into force on 25 May 2018, certain organisations are required to appoint a DPO (data protection officer). An organisation is required to appoint a designated DPO where it is a public authority or body, or where its core activities consist of either: Data processing operations that require regular and systematic monitoring of data … [Read more...]

52% of web applications contain high-severity vulnerabilities

A new study has highlighted the poor state of web application security. Positive Technologies tested various web applications, and found that every single one contained vulnerabilities, with 52% containing high-severity weaknesses.  The Web Application Vulnerabilities report also found that:  48% of tested applications are vulnerable to unauthorised access;  44% of applications placed personal … [Read more...]