dcsimg

5 ways to spot phishing scams

Phishing is one of the most common tactics cyber criminals use to steal people’s data and infect their devices with malware. It uses deceptive emails and websites to trick victims into clicking malicious links, downloading attachments or sending sensitive information.   Phishing emails can impersonate well-known brands or even people you know, such as colleagues. The goal is to trick the recipient … [Read more...]

Why you should be concerned about employees using social media at work

There’s a time and a place for browsing social media, and for some of us that’s ‘all the time’ and ‘anywhere’. It doesn’t matter if you’re posting a quick Tweet, jumping to attention when you receive an IM or idly refreshing Facebook for updates; nothing can keep us in the real world for long.  And although employers have long since lost the battle to prevent staff glancing at their Facebook … [Read more...]

3 tips to get the most from your information security audits

Your organisation won’t be able to protect its systems for long without an information security audit. That’s because cyber threats and the way your organisation operates is constantly changing, requiring you to regularly take stock of your security practices.  Whether you’re trying to certify to an information standard, meet legal requirements or perform an internal assessment of your current … [Read more...]

Burger King data breach potentially exposed the data of thousands of children

Kool King, an online shop owned by Burger King, had thousands of customer records exposed through an unsecured database, which was discovered last week.  The website allows customers who purchase from the children’s menu in Burger King, France to access content, including games, films and activities, after creating a profile on the platform.   The breached database, which potentially contained the … [Read more...]

Senior employees lack accountability regarding cyber security

C-level employees are putting their organisations at risk by neglecting cyber security practices, a new report suggests.  According to McAfee’s Grand Theft Data II: The Drivers and Shifting State of Data Breaches, 61% of respondents believe executives demand greater lenience when it comes to cyber security policies and processes. This includes things such as choosing not to attend staff awareness … [Read more...]

What ISO 27001 is and why you should implement it

ISO 27001 is the international standard that describes best practice for an ISMS (information security management system). But what does that really mean? How different will your organisation be for having adopted the Standard, and what benefits does it provide?  We answer those questions and more in this blog.  What does ISO 27001 do?  The main objective of ISO … [Read more...]

Why you should adopt ISO 27001

A version of this blog was originally published on 13 June 2018  With cyber attacks and data breaches on the rise, organisations are making information security a top priority. Many have chosen to tackle the risk with the help of an ISMS (information security management system).  An ISMS is a system of documents, technology and people-management processes that … [Read more...]

Accelerate your compliance project with our free ISO 27001 bundle trial

The growing risk of data breaches coupled with the GDPR’s (General Data Protection Regulation) strict regulatory requirements has led many organisations to look for proven, affordable ways to achieve robust cyber security.  For many, the solution has come in the form of ISO 27001, the international standard for information security.  The most recent … [Read more...]

‘We need bigger cyber security budgets’, organisations say in new survey

Organisations need to invest more money into cyber security defences if they are to fight back against the growing threat of data breaches, an Ernst & Young survey has found.  According to the professional services firm’s Global Information Security Survey 2018–19, 87% of respondents said they don’t have the budget to deal with … [Read more...]

How IT Governance can help with your cyber security concerns

Cyber security is a complex topic, so we wouldn’t be surprised if you had questions about what your organisation should be doing. The threat of data breaches grows each year, organisations process more information than ever and the regulatory landscape is becoming a minefield to navigate.  Fortunately, IT Governance’s team of experts has the answers, and our extensive range of … [Read more...]