dcsimg

Why your organisation should consider outsourcing its DPO

Since the EU’s GDPR (General Data Protection Regulation) came into effect in May 2018, demand for DPOs (data protection officers) has increased. The Regulation stipulates that certain organisations must appoint a DPO to support their GDPR compliance. DPOs also have an essential role as intermediaries between relevant stakeholders, such as supervisory authorities, data subjects, and business units … [Read more...]

3 things you should do to prevent cyber attacks

Cyber attacks come in a variety of forms, each intended to exploit specific weaknesses in your organisation. As such, there’s no single way to stay secure.   There are countless things you can try, from following simple tips to making widespread changes, but discussing them all would probably leave you with more questions than answers. Instead, we’ve highlighted three things you must do to … [Read more...]

Data security on premises and off

Keeping content safe no matter where it “lives.” We talk a lot about multi-layered security: perimeter security, network security, cloud security, device security – but what is it that we most need to protect?  The answer usually boils down to: the data. … [Read more...]

CEOs the worst offenders when it comes to email security

Nearly 60% of organisations will fall victim to an email-based attack this year, and there’s a good chance the guilty party will be the CEO, according to Mimecast’s The State of Email Security 2018. According to the report, 37% of respondents said their organisation’s CEO is a “weak link” in their cyber security programme. Evidence backs this up: Mimecast found that 31% of C-level employees had … [Read more...]

Finding the right candidate to be your DPO

Complying with the EU GDPR (General Data Protection Regulation) is mostly about hard work and organisation, but there’s also a little bit of luck involved – at least when it comes to appointing a DPO (data protection officer). The position, which is mandatory for many organisations under the GDPR, has caused a massive spike in demand for data protection experts. Unless the perfect candidate falls … [Read more...]

The top cyber security trends of 2018 so far

There have been more than 600 data breaches this year, so people who want to pick out the most serious incidents have plenty to choose from. It’s not simply a case of finding the breaches involving the highest number of stolen records, because a breach compromising names and email addresses isn’t the same as a breach compromising payment card information. Besides, infrastructural damage and … [Read more...]

How ISO 27001 can help protect your organisation

There’s a reason ISO 27001 is the go-to standard for information security. It details best practices for staying secure, covering the way you manage people, processes and technology. Certifying to ISO 27001 demonstrates that your organisation’s practices are up to scratch, and although it obviously doesn’t eradicate the risk of data breaches, it goes a long way to keeping you secure. If you do … [Read more...]

52% of web applications contain high-severity vulnerabilities

A new study has highlighted the poor state of web application security. Positive Technologies tested various web applications, and found that every single one contained vulnerabilities, with 52% containing high-severity weaknesses.  The Web Application Vulnerabilities report also found that:  48% of tested applications are vulnerable to unauthorised access;  44% of applications placed personal … [Read more...]

The future for CISOs following the introduction of the GDPR and NIS Directive

The responsibilities of the CISO (chief information security officer) have remained consistent over the years, but big changes in the cyber security landscape in 2018 could spark an evolution of the role.  Largely led by the introduction of the EU GDPR (General Data Protection Regulation) and the NIS Directive (Directive on security of network and information systems), organisations are shifting … [Read more...]

Why you should adopt ISO 27001

With cyber attacks and data breaches on the rise, cyber security is fast becoming organisations’ top priority. Many have chosen to mitigate the risk by implementing an information security management system (ISMS). An ISMS is a system of processes, documents, technology and people that helps organisations manage, monitor and improve their information security in one place. ISO 27001 is the … [Read more...]