dcsimg

What makes ISO 27001 the go-to standard for information security?

ISO 27001 is one of the fastest-growing management standards in the world. with the number of awarded certifications increasing by 20% in consecutive years. In 2016 (the last available figures), 33,290 certifications were issued worldwide, and 27,536 certifications were awarded the year before.  ISO 27001 is clearly very popular, but what makes it the standard for information … [Read more...]

The future for CISOs following the introduction of the GDPR and NIS Directive

The responsibilities of the CISO (chief information security officer) have remained consistent over the years, but big changes in the cyber security landscape in 2018 could spark an evolution of the role.  Largely led by the introduction of the EU GDPR (General Data Protection Regulation) and the NIS Directive (Directive on security of network and information systems), organisations are shifting … [Read more...]

1 in 8 cyber attacks successful in Denmark

A recent survey by the Danish Society of Engineers’ IT subsidiary, IDA-it, concluded that two thirds of businesses had experienced a cyber attack, and that up to one in eight cyber attacks carried out against Danish organisations are successful. IDA-it surveyed people working in IT or personal data related roles in the public and private sector. Kåre Løvgren, IDA-it’s chairperson, said that … [Read more...]

9 steps to implementing ISO 27001

There are many reasons to adopt ISO 27001, the international standard that describes best practice for an information security management system (ISMS). It helps organisations improve their security, comply with cyber security regulations, and protect and enhance their reputation. But implementing the Standard takes a lot of time and effort. That should be obvious, at least if you believe the … [Read more...]

The GDPR: What you need to know about DPIAs

Article 35 of the EU General Data Protection Regulation (GDPR) introduces the concept of data protection impact assessments (DPIAs). DPIAs help organisations identify and minimise privacy risks in data processing activities. They are essential if you process any high-risk data, but they are also relevant when you are introducing a new data collection process, system or technology. An effective … [Read more...]

How to spot a phishing attack

Phishing is one of the biggest threats that individuals and organisations face, but do you know what they are, what they look like, and where to look for them? In the broadest sense, phishing is any attempt to pose as a trustworthy source in order to get people to hand over personal information. Phishing usually takes the form of mass emails sent to hundreds or thousands of people, criminals can … [Read more...]

Why are so many organisations getting certified to ISO 27001?

What do Microsoft, Verizon, Apple, Google, Intel, and Amazon have in common? As well as all being Fortune 500 companies, they are all ISO 27001 certified. With a global growth rate of 20%, ISO 27001 has become the de facto standard for information security management system (ISMS) certifications. Why are so many organisations getting certified to ISO 27001? Data breaches and cyber attacks are, … [Read more...]

The challenges facing companies in the lead up to GDPR – A consultant’s perspective

Sharon O’Reilly, GRC/GDPR consultant at IT Governance Europe, was interviewed by The Sunday Business Post before her appearance today at the GDPR Summit. She discussed the challenges facing organisations in the lead up to the General Data Protection Regulation (GDPR).  According to Sharon, these challenges include:  Finding/sourcing the right people to drive compliance programmes;  Determining … [Read more...]

12 questions to ask your CISO

With the rise in cyber attacks and increased risk of a data breach, organisation boards are under increased pressure than ever to improve data governance and security. To help organisations ensure that all areas of cyber security are covered, IT Governance’s team of cyber security experts have examined the top 12 questions that you need to ask your CISO. Download this free brochure to … [Read more...]

Possible breach at INM threatening ‘the very core’ of investigative journalism

The Office of the Data Protection Commissioner (ODPC) has claimed that data relating to former and current staff at Independent News & Media (INM), including four journalists and former directors, has been breached. The Office of the Director of Corporate Enforcement (ODCE) was concerned that data was removed from the organisation’s premises in October 2014, and subsequently taken out of the … [Read more...]