Welcome to our blog, where we navigate information security and technology management.
How long does it take to implement ISO27001?
One of the questions which is most often asked about ISO27001, is how long it takes to implement. There are several factors which will influence the answer.
The ICO says that organisations must do more to combat the growing threat of cyber attacks
‘Organisations must do more to combat the growing threat of cyber attacks’ says the UK’s data protection regulator, the ICO. They go on to say ‘…we will take action, including fines, against organisations that are...
Unreturned Police ID Card causes Concern for Lone Female Motorist
At first glance this news might not seem like its about information security, but it absolutely is.
A 2 minute job could have prevented distress for someone and reputational damage for two police services.
The Risks Posed by Shadow IT and Strategies for its Removal
In today’s workplace, technology serves as the backbone of operations, enabling efficiency, collaboration, and innovation. However, lurking in the shadows of organisational infrastructure lies a phenomenon known as Shadow IT.
Which is Better for your Organisation?
Maintaining the integrity of authentication and access control to your information assets is one of the most important aspects of information security. Yet it’s also one of the weakest links in the information security chain. A couple of...