The challenge
Our client wanted to renew its Cyber Essentials Plus certification and increase customer confidence by demonstrating that its cyber security measures were appropriate for the risks it faced.
18 November 2025
Case Study
Cyber Essentials
The challenge
Our client wanted to renew its Cyber Essentials Plus certification and increase customer confidence by demonstrating that its cyber security measures were appropriate for the risks it faced.
The solution
Cyber Essentials Plus certification
The benefit
Cyber Essentials Plus certification provides independently audited proof that organisations maintain a level of information security recommended by the NCSC (National Cyber Security Centre).
It has been a pleasure working with the team at GRC/ITG for another year to run through our Cyber Essentials and CE Plus. We have committed to the constant improvement needed to ensure that as we grow, we also mature our stance with cyber security. As any brand knows, the larger you get the more of a target you are, but over the last couple of years we've also heard about substantially smaller companies getting hit with attacks. Our rapid growth needed everything to be scalable and to ensure everything was in place to ensure we didn't hit any bottlenecks on any platforms. Working with GRC/ITG ensures that all the hard work the team are doing to implement the right policies, controls and monitoring are working well for us and we aren't missing anything needed to ensure we run as safely and securely as possible. Brands take on a responsibility for data in many forms, customer and staff are just a part of this. The value in having all the hard work checked and agreed with is worth every penny. We also work with GRC/ITG to run penetration tests against our websites which forms part of our deployment plans. We believe this is essential to ensure we are doing everything we can to protect our customer data as much as possible, on top of ensuring maximum uptime for our web assets. Cyber Security can be daunting and having someone check your homework naturally makes you anxious, but working with the team at GRC/ITG for yet another year was a genuine pleasure and allowed the team to celebrate another year of awesome quality work.
Background
Our client, which wishes to remain anonymous, is a leading UK-based operator in the indoor leisure and attractions sector, specialising in high-adrenaline experiences for both individuals and groups.
With more than 40 venues across the UK and Europe, the organisation welcomes well over 1 million visitors annually. Our client has used our services since 2021.
About IT Governance Ltd, a GRC Solutions company
IT Governance is one of the founding Cyber Essentials certification bodies and remains one of the UK’s largest, having issued more than 9,000 certificates to date.
We offer end-to-end support – including documentation, scanning and assessments – with same-day turnaround, one-to-one guidance as standard, and a customer success rate of 98%. Backed by qualified cyber security practitioners and a ‘World-Class’ NPS of +100, we provide unrivalled expertise to help you achieve certification and take the next steps beyond.
About the Cyber Essentials scheme
Cyber Essentials is a UK government-backed certification scheme that helps organisations protect themselves from around 80% of common cyber threats. It mandates five basic security controls and certification is available at two levels: Cyber Essentials and Cyber Essentials Plus.
Cyber Essentials certification is widely recognised as a minimum standard for cyber security assurance and is often required in public-sector procurement contracts.
The scheme is managed by IASME (the IASME Consortium), which licenses certification bodies – such as IT Governance Ltd – to carry out Cyber Essentials and Cyber Essentials Plus certifications.
Cyber Essentials certificates last 12 months and are listed on the IASME website, demonstrating certified organisations’ commitment to protecting their and their customers’ data.
The process
Cyber Essentials Plus certification requires organisations to undergo a series of internal and external vulnerability tests.
The internal scan checks patch levels and system configurations, while the security and anti-malware test ensures that the organisation’s systems are resistant to malicious email attachments and web-downloadable binaries.
The following internal tests are required for Cyber Essentials Plus:
The external scan also checks the patch levels and system configurations, but of the public facing infrastructure. The following external tests are required for Cyber Essentials Plus:
We provided daily vulnerability scan reports using Qualys, enabling the client to track and address any issues in near real time. Alongside these reports, we supplied clear remediation guidance and supporting documentation to help the client prioritise and implement fixes efficiently.
The client already had a strong technical foundation in place, using a suite of well-configured security tools:
These technologies, coupled with the client’s adherence to Cyber Essentials best practices, made the compliance process exceptionally smooth. Its proactive approach to patch and vulnerability management, antivirus configuration, firewall rules, multi-factor authentication, password policy and user access controls aligned closely with the scheme’s requirements.
Daily Qualys reports enabled the client to supplement its SentinelOne monitoring, identifying any residual vulnerabilities not detected by the endpoint platform – including those with lower risk scores. Any high or critical issues were resolved rapidly, thanks to effective collaboration between our team and the client’s in-house IT staff.
Our engagement reflected IT Governance’s core values:
The outcome
The client passed its Cyber Essentials Plus audit within just two days, demonstrating not only its technical preparedness but also its ongoing commitment to security by design. Its use of robust, well-integrated technologies – supported by a consistent patching schedule and sound configuration practices – enabled it to maintain a strong security posture and respond swiftly to any emerging risks.
The solution
Self-certification
Standard Cyber Essentials Plus certification package.
From £2,055 + VAT
(https://www.itgovernance.co.uk/shop/product/cyber-essentials-and-cyber-essentials-plus-certification)
Get a Little Help
Full support through the certification process with expert guidance.
From £2,355 + VAT 
(https://www.itgovernance.co.uk/shop/product/cyber-essentials-plus-get-a-little-help)
Get a Lot of Help
Comprehensive support for complex organisations.
From £3,055 + VAT 
Why choose IT Governance, a GRC Solutions company?
Benefit 1: IT Governance was a founding Cyber Essentials certification body and remains one of the largest in the UK, issuing more than 9,000 certificates.
Benefit 2: Our Cyber Essentials services have received a ‘World-Class’ NPS (Net Promoter Score) of +100.
Benefit 3: With a large team focused on Cyber Essentials, we offer same-day turnaround on your certificates.
Benefit 4: We offer everything you need to get Cyber Essentials certification, such as documentation, scanning, and assessments.
Benefit 5: End-to-end support – we deliver all the technical tests and assessments, conducted by our experienced technical testers.
Benefit 6: Tailored solutions – our unique fixed-price bundles provide expert support and compliance tools at affordable rates.
Keep reading
Uncategorized
Test Gated Post
01 December 2025
·
Knowledge
What is Cyber Security? Definition and Best Practices
28 November 2025
·
Knowledge
UK Government Minimum Cyber Security Standard
28 November 2025
·
Knowledge
Transitioning to ISO 27001:2022 | GRC Solutions
28 November 2025
·
Knowledge
SWIFT CSCF Compliance | IT Governance Ltd
28 November 2025
·
Knowledge
Speak to a cyber security expert
28 November 2025
·
Knowledge
What is Social Engineering? Examples & Prevention Tips
28 November 2025
·
Knowledge
Securities and Exchange Commission Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
28 November 2025
·
Knowledge
The Sarbanes-Oxley Act | GRC Solutions
27 November 2025
·
Knowledge
What is Phishing? Attack Techniques & Prevention Tips
27 November 2025
·
Knowledge
NIST Cybersecurity Framework (CSF) | GRC Solutions
27 November 2025
·
Knowledge
Operators of Essential Services and the NIS Regulations
27 November 2025
·
Knowledge
Digital Service Providers and the NIS Regulations
26 November 2025
·
Knowledge
NIS Regulations: Cyber Assessment Framework
26 November 2025
·
Knowledge
The NIS Directive and NIS Regulations
26 November 2025
·
Knowledge
Management system integration
26 November 2025
·
Knowledge
ITSM (IT Service Management)
26 November 2025
·
Knowledge
GRC Solutions ITIL and ITSM books
26 November 2025
·
Knowledge
ITIL®
26 November 2025
·
Knowledge
IT Governance: definition & explanation
26 November 2025
·
Knowledge
ISO 27701
26 November 2025
·
Knowledge
ISO 27017 and ISO 27018 Cloud security | GRC Solutions
26 November 2025
·
Knowledge
ISO 27005
26 November 2025
·
Knowledge
ISO 27001 Risk Assessments
26 November 2025
·
Knowledge
FastTrackâ„¢ | ISO 27001 | GRC Solutions
26 November 2025
·
Knowledge
Typical ISO 27001 certification costs
26 November 2025
·
Knowledge
Key Benefits of ISO 27001 Certification
26 November 2025
·
Knowledge
ISO/IEC 27001:2022 and ISO/IEC 27002:2022
26 November 2025
·
Knowledge
iso27001 2022 transition training
26 November 2025
·
Knowledge
ISO27001
26 November 2025
·
Knowledge
iso27000 family
26 November 2025
·
Knowledge
ISO22301 business continuity standard
26 November 2025
·
Knowledge
ISO20000
21 November 2025
·
Knowledge
ISO9001 Quality Management Standards
21 November 2025
·
Knowledge
ISMS Benefits
21 November 2025
·
Knowledge
Infosec
21 November 2025
·
Knowledge
Implementing ISO27001
21 November 2025
·
Knowledge
GDPR and ISO 27001
21 November 2025
·
Knowledge
Gambling Commission Compliance
21 November 2025
·
Knowledge
Federal Cybersecurity and Privacy Laws
21 November 2025
·
Knowledge
EU Digital Operational Resilience Act
21 November 2025
·
Knowledge
EU Cybersecurity Act
21 November 2025
·
Knowledge
Email Security
21 November 2025
·
Knowledge
DFARS
21 November 2025
·
Knowledge
Data Classification Software
21 November 2025
·
Knowledge
Cyber Threats
21 November 2025
·
Knowledge
Cyber Security Standards
21 November 2025
·
Knowledge
Cyber Security Risk Management
21 November 2025
·
Knowledge
Cyber Security Risk Assessment
21 November 2025
·
Knowledge
Cyber Security Consultancy Services
21 November 2025
·
Knowledge
Cyber Resilience Framework
21 November 2025
·
Knowledge
Cyber Resilience
20 November 2025
·
Knowledge
Cyber Incident Response
20 November 2025
·
Knowledge
Cyber Crime
20 November 2025
·
Knowledge
Compliance
20 November 2025
·
Knowledge
Cloud Security
20 November 2025
·
Knowledge
Capability Maturity Model
20 November 2025
·
Knowledge
Business Resilience
20 November 2025
·
Knowledge
Benefits of ISO 22301
20 November 2025
·
Knowledge
BC DR
20 November 2025
·
Knowledge
Advanced Persistent Threats APT
20 November 2025
·
Knowledge
Accredited Certification
20 November 2025
·
Articles
SOC reporting
20 November 2025
·
Knowledge
The pecr and eu eprivacy directive
20 November 2025
·
Knowledge
GDPR privacy compliance framework and standards
20 November 2025
·
Knowledge
GDPR Data Mapping
20 November 2025
·
Knowledge
GDPRConsultancy
20 November 2025
·
Knowledge
GDPR Compliance with ISO 27001
20 November 2025
·
Knowledge
GDPR Anniversary
20 November 2025
·
Knowledge
ePrivacy Regulation EPR
20 November 2025
·
Knowledge
DPO as a Service
20 November 2025
·
Knowledge
DPA and GDPR penalties
20 November 2025
·
Knowledge
GDPR Gap Analysis
19 November 2025
·
Knowledge
DPA 2018 part 4 intelligence processing
19 November 2025
·
Knowledge
DPA 2018 part 3 law enforcement processing
19 November 2025
·
Knowledge
DPA 2018
19 November 2025
·
Knowledge
Data subject access requests
19 November 2025
·
Knowledge
Data Sovereignty and the Cloud
19 November 2025
·
Knowledge
Data protection officer dpo under the gdpr
19 November 2025
·
Knowledge
Data Protection dpa and eu data protection regulation
19 November 2025
·
Knowledge
Data Protection
19 November 2025
·
Knowledge
Data Privacy
19 November 2025
·
Knowledge
Data Governance
19 November 2025
·
Knowledge
Data Breaches
19 November 2025
·
Knowledge
Articles of the GDPR
19 November 2025
·
Knowledge
PCI DSS | What It Is and How to Comply
19 November 2025
·
Knowledge
Vulnerability testing for Cyber Essentials
19 November 2025
·
Knowledge
Cyber Essentials: Secure Configuration
19 November 2025
·
Knowledge
Cyber Essentials: Patch Management
19 November 2025
·
Knowledge
Cyber Essentials: Malware Protection
19 November 2025
·
Knowledge
ISO 27001 and the Cyber Essentials Scheme
19 November 2025
·
Knowledge
Defining the scope for Cyber Essentials certification
19 November 2025
·
Knowledge
The Cyber Essentials Scheme
19 November 2025
·
Knowledge
Cyber Essentials Repeat Testing and Assessment Fees
18 November 2025
·
Knowledge
The Cyber Essentials SAQ (Self-Assessment Questionnaire)
18 November 2025
·
Knowledge
Cyber Essentials for the MOD Supply Chain
18 November 2025
·
Knowledge
Cyber Essentials FAQs
18 November 2025
·
Knowledge
Cyber Essentials Benefits
18 November 2025
·
Knowledge
Cyber Essentials: Boundary Firewalls and Internet Gateways
18 November 2025
·
Knowledge
Cyber Essentials: User Access Control
18 November 2025
·
Knowledge
What is AI governance and why does it matter?
18 November 2025
·
Knowledge
ISO 42001: What it is and why it matters for AI management
18 November 2025
·
Knowledge
The EU AI Act: what it means for your organisation and how to comply
18 November 2025
·
White Papers
CISSP study planner
18 November 2025
·
Blog
IT Standards | GRC Solutions
18 November 2025
·
Blog
Become an GRC Solutions channel partner
18 November 2025
·
White Papers
Ethical Hacking Career Roadmap
17 November 2025
·
White Papers
Cyber Essentials – 2025 Scheme Changes: What You Need to Know
17 November 2025
·
Articles
Global Data Breaches and Cyber Attacks in October 2025 – At Least 21.2 Million Breached Records
14 November 2025
·
Articles
GRC Solutions Named Among the UK’s Top 20 Cyber Security Innovators
14 November 2025
·
Articles
Data Leakage Prevention and Data Deletion – ISO 27001 Controls 8.12 and 8.12 Explained
13 November 2025
·
Articles
Threat Intelligence – ISO 27001:2022 Control 5.7 Explained
06 November 2025
·
Articles
How DORA fits with ISO 27001, NIS2 and the GDPR
03 November 2025
·
Articles
CISM Exam Tips from a Consultant: Five Insider Insights to Help You Pass
03 November 2025
·
Articles
How To Comply with ISO 27001’s New Cloud Services Control
03 November 2025
·
Articles
What DORA Means for ICT Suppliers: MSPs, SaaS and Cloud in Scope
31 October 2025
·
Knowledge
Cyber Security Must Be a Board Priority – And It Starts With Cyber Essentials
28 October 2025
·
Articles
Top 5 Skills Every ISO 27001 Internal Auditor Needs
22 October 2025
·
Articles
AWS Outage: A Supply-Chain Security Lesson
21 October 2025
·
Articles
Global Encryption Day: Why Encryption Is a Core Requirement
21 October 2025
·
Articles
Why You Need Cyber Resilience and Defence in Depth
21 October 2025
·
Articles
ISO 27001:2022 Clause 6 – What’s Changed and What You Need to Do About It
21 October 2025
·
Articles
4 reasons to get CISMP qualified
20 October 2025
·
Articles
CISM vs CISSP: Which Certification is Right for You in 2025
17 October 2025
·
Articles
CISMP vs Security+: Which Certification is Right for You in 2025?
15 October 2025
·
Articles
ISO 27001 for Non-IT Roles: A Beginner’s Guide
15 October 2025
·
Articles
CRISC Salary & Career in the UK: What to Expect in 2025
10 October 2025
·
Articles
5 Practical Skills You’ll Gain from a GDPR Practitioner Course
10 October 2025
·
Articles
ISO 27001 Internal vs Lead Auditor Training Compared
10 October 2025
·
Articles
Global Data Breaches and Cyber Attacks in September 2025: Nearly 2 Million Records Exposed and Potentially 1.5 Billion More
08 October 2025
·
Articles
Is CISM Worth It? Salary, Career Value & Employer Demand in 2025
06 October 2025
·
Knowledge
5 Common GDPR Mistakes – and How Training can Fix Them
06 October 2025
·
Articles
5 Reasons ISO 27001 Implementations Fail (and How to Avoid Them)
03 October 2025
·
Articles
Our Experts’ Views on the Jaguar Land Rover Cyber Attack
01 October 2025
·
Knowledge
A Guide to the EU GDPR’s Requirements for an EU Representative
01 October 2025
·
Knowledge
Who Needs ISO 27001 Foundation Training?
01 October 2025
·
Knowledge
Human Error and Accidental Data Breaches: Lessons from Recent Cases
01 October 2025
·
Articles
How to Become a DPO (Data Protection Officer) in the UK
29 September 2025
·
Articles
How to Get Cyber Essentials Certified in 2025: Updated Steps and Key Changes
26 September 2025
·
Knowledge
GDPR Foundation vs Awareness Training: Which is Right for Your Team?
25 September 2025
·
Blog
The Data Protection Officer (DPO) Role – A beginner’s guide
25 September 2025
·
Articles
CISSP® Exam Myths: What Learners Get Wrong
22 September 2025
·
Articles
UK GDPR Representative Services: What You Need to Know
19 September 2025
·
Articles
How to Maintain ISO 27001 Certification: 7 Top Tips
16 September 2025
·
Articles
3 ISO 27001:2022 Controls That Help Secure Your Cloud Services
15 September 2025
·
Articles
How ISO 27001 Helps You Comply With DORA
15 September 2025
·
White Papers
Free White Paper: The EU AI Act and ISO 42001 – A Beginner’s Guide
13 September 2025
·
Knowledge
GDPR Data Protection Impact Assessments: The 7 Key Stages of the DPIA Process
10 September 2025
·
Articles
Global Data Breaches and Cyber Attacks in August 2025: over 17.3 million records exposed
08 September 2025
·
Knowledge
Cyber Essentials: The 5 Cost-Effective Security Controls Everyone Needs
19 August 2025
·
Articles
Nine Steps to SOC 2 Compliance – Including a SOC 2 Readiness Checklist
14 August 2025
·
Articles
Global Data Breaches and Cyber Attacks in July 2025: over 14.9 million records exposed
12 August 2025
·
Articles
Data Protection Enforcement: Your Cookie Compliance Questions Answered
08 August 2025
·
Knowledge
A Guide to TOMs (Technical and Organisational Measures) Under the GDPR
06 August 2025
·
Articles
What are the Different Types of Penetration Test?
05 August 2025
·
Knowledge
The Six Data Processing Principles of the UK GDPR Explained
01 August 2025
·
Articles
The 4 CRISC Domains Explained
28 July 2025
·
Articles
What Are ISO 27017 and ISO 27018, and What Are Their Controls?
23 July 2025
·
Articles
The 9 CISMP Domains Explained
21 July 2025
·
Articles
How One Weak Password Destroyed a 158-Year-Old Company
21 July 2025
·
Knowledge
Nine Steps to Conducting a GDPR Gap Analysis
18 July 2025
·
Knowledge
Are You Ready for Cyber Essentials?
18 July 2025
·
Knowledge
How to Write a GDPR Data Retention Policy – with template
16 July 2025
·
Articles
The 4 CISM Domains Explained
14 July 2025
·
Articles
Choosing the Right PCI DSS SAQ: A Practical Guide
11 July 2025
·
Articles
Information Security vs Cyber Security: The Difference
09 July 2025
·
Articles
The 5 CISA Domains Explained
07 July 2025
·
Articles
How ISO 42001 supports EU AI Act compliance
04 July 2025
·
Articles
Global Data Breaches and Cyber Attacks in June 2025: Over 16 billion records exposed
04 July 2025
·
Articles
7 Steps to a Successful ISO 27001 Risk Assessment (Updated for 2025)
02 July 2025
·
Knowledge
How to Write a GDPR Data Protection Policy (Updated for 2025)
01 July 2025
·
Articles
Building Your Cyber Security Career: The Credentials Needed for Management and Specialist Roles
30 June 2025
·
Knowledge
How to Respond to a DSAR (Data Subject Access Request)Â
30 June 2025
·
Knowledge
How to Write a GDPR Data Privacy Notice – Updated Guide and Template for 2025
24 June 2025
·
Knowledge
The Critical Role of a DPO: Why Outsourcing is the Smart Choice
20 June 2025
·
Knowledge
The Data (Use and Access) Act and How it Affects the UK GDPR and DPA 2018, and PECR
19 June 2025
·
Articles
Understanding the CIA Triad in 2025: A Cornerstone of Cyber Security
18 June 2025
·
Articles
Global Data Breaches and Cyber Attacks in May 2025 – More Than 1.4 Billion Records Breached
17 June 2025
·
Articles
Penetration Testing for SaaS Providers: Building Trust and Security
12 June 2025
·
Articles
How to Start Your Career in Data Protection and Privacy
10 June 2025
·
Knowledge
GDPR Documentation: The Documents You Need to Comply with the UK and EU GDPR
09 June 2025
·
Articles
How to FastTrack your ISO 27001 ISMS Implementation and Certification
05 June 2025
·
Articles
Author of the Month: Bridget Kenyon
04 June 2025
·
Articles
CCTV and the GDPR in 2025: What Employers Must Know
03 June 2025
·
Knowledge
The GDPR in 2025: What’s the Difference between Personal Data and Special Category Data?
03 June 2025
·
Articles
Data Protection Gap Analysis: Identifying Weak Spots Before Regulators Do
29 May 2025
·
Knowledge
Lessons Learned from the Legal Aid Agency Data Breach
22 May 2025
·
Articles
How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags
16 May 2025
·
Articles
The Co-op, M&S, Harrods… You? Mitigating the Risk of Ransomware
13 May 2025
·
Articles
The 8 CISSP domains explained
08 May 2025
·
Articles
Windows 10 End of Life: What Does it Mean for Your Organisation?
02 May 2025
·
Articles
Author of the Month: Richard Bingley
01 May 2025
·
Articles
Author of the Month: Andrew Pattison
01 April 2025
·
Knowledge
The Cyber Essentials Scheme’s 2025 Update and What it Means for Your Organisation
20 March 2025
·
Knowledge
What It Takes to Be Your Organisation’s DPO or Data Privacy Lead
20 January 2025
·
Articles
Free Expert Insights: Index of Interviews
15 January 2025
·
Articles
How Can Organisations Transition to ISO 27001:2022?
14 January 2025
·
Articles
The Benefits of Becoming an Ethical Hacker
13 January 2025
·
Knowledge
Step-by-Step Guide to Achieving GDPR Compliance
08 January 2025
·
Articles
How You Can Continually Improve Your ISO 27001 ISMS (Clause 10)
06 January 2025
·
Knowledge
How a GDPR Gap Analysis Helps Secure Support From Senior Management
11 December 2024
·
Articles
How to Select Effective Security Controls
09 December 2024
·
Articles
Cyber Threats During the Holidays: How to Stay Safe From Seasonal Scams and Data Breaches
04 December 2024
·
Knowledge
Cyber Essentials vs ISO 27001: Key Differences
02 December 2024
·
Articles
Meet the Hacker: How Simulated Phishing Addresses Your Biggest Security Risk
27 November 2024
·
Articles
Breaking In to Keep Hackers Out: The Essential Work of Penetration Testers
25 November 2024
·
Knowledge
How Do the Cyber Essentials and Cyber Essentials Plus Assessments Work?
20 November 2024
·
Articles
How to Create a Strong Security Culture
18 November 2024
·
Articles
Your Biggest Security Risk: The Insider Threat
13 November 2024
·
Articles
Layering Defences to Safeguard Sensitive Data Within AI Systems
11 November 2024
·
Knowledge
How Organisations Are Failing to Process Personal Data Lawfully Under the GDPR
04 November 2024
·
Articles
The 6 CCSP Domains Explained
30 October 2024
·
Knowledge
GDPR: International Data Transfers Using the IDTA, SCCs or BCRs
28 October 2024
·
Articles
Strategies for Securing Your Supply Chain
23 October 2024
·
Articles
How to Meet the NCSC’s 14 Cloud Security Principles
21 October 2024
·
Articles
The Insider Threat: Strategies to Safeguard Against Malicious Insiders
16 October 2024
·
Knowledge
GDPR: Data Subject Rights and Organisations’ Responsibilities
14 October 2024
·
Knowledge
How Do You Demonstrate Accountability Under the GDPR?
08 October 2024
·
Articles
Security Risks of Outsourcing to the Cloud: Who’s Responsible?
03 October 2024
·
Articles
7 Steps to Prepare for PCI DSS Audit Success
01 October 2024
·
Articles
How to Overcome Unconscious Bias in the Workplace
24 September 2024
·
White Papers
GDPR Benchmark Report: Compliance Insights
17 September 2024
·
Articles
8 Ways to Reduce Your PCI DSS Compliance Burden
17 September 2024
·
Articles
How to Address AI Security Risks With ISO 27001
12 September 2024
·
Articles
How to Write a Modern Slavery Statement – 6-Step Guide
10 September 2024
·
Articles
How Do You Mitigate Information Security Risk?
05 September 2024
·
Articles
Where to Start with Cyber Security Risk Management
29 August 2024
·
Articles
Tips for Environmental Sustainability at Work and How ISO 14001 Can Help
27 August 2024
·
Knowledge
What Is Access Control and Why Do Cyber Essentials and ISO 27001 Require It?
21 August 2024
·
Knowledge
A Guide to GDPR International Transfers
20 August 2024
·
Articles
Online Merchants: PCI DSS Compliance Tips When Outsourcing
15 August 2024
·
Articles
Are You Meeting Your Occupational Health & Safety Requirements?
13 August 2024
·
Knowledge
Streamlining GDPR Compliance With ROPAs, Data Flow Maps and DPIAs
08 August 2024
·
Articles
5 Cyber Security and ISO 27001 Myths
01 August 2024
·
Articles
CrowdStrike: Lessons on the Importance of Contracts, Insurance and Business Continuity
30 July 2024
·
Articles
How to Easily Meet the PCI DSS Awareness Training Requirements
25 July 2024
·
Articles
ISO 27001:2022 Transition Challenges and How to Use ISO 27002
18 July 2024
·
Articles
Analysing Data Breaches Caused by Human Error
16 July 2024
·
Articles
The Good, the Bad and the Improvable of PCI DSS v4
11 July 2024
·
Articles
‘RockYou2024’: Nearly 10 BILLION Unique Plaintext Passwords Leaked
10 July 2024
·
Knowledge
GDPR Article 28 Contracts: What You Need to Know
09 July 2024
·
Knowledge
Records of Processing Activities (ROPAs): Simplifying GDPR Compliance
04 July 2024
·
Articles
Security Trends for 2024 and Beyond
28 June 2024
·
Articles
Creating an AI Policy – A Guide for SMEs
10 June 2024
·
Articles
Worrying Ransomware Trends, and What to Do About Them
07 June 2024
·
Articles
Security Tips and Concerns for Remote Working
31 May 2024
·
Articles
A Practical Guide to Cyber Incident Response
24 May 2024
·
Articles
ISO 27001 and Physical Security
15 May 2024
·
Articles
6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident
07 May 2024
·
Articles
Global Data Breaches and Cyber Attacks in 2024
02 May 2024
·
Articles
Global Data Breaches and Cyber Attacks in April 2024 – 5,336,840,757 Records Breached
02 May 2024
·
Articles
The Week in Cyber Security and Data Privacy: 22 – 28 April 2024
29 April 2024
·
Articles
Looking Back on the Channel Partner Event and Awards 2024
24 April 2024
·
Articles
The Week in Cyber Security and Data Privacy: 15 – 21 April 2024
22 April 2024
·
Articles
Cyber Defence in Depth: An Expert’s Overview
19 April 2024
·
Articles
The Week in Cyber Security and Data Privacy: 8 – 14 April 2024
15 April 2024
·
Articles
The Week in Cyber Security and Data Privacy: 1 – 7 April 2024
09 April 2024
·
Articles
Global Data Breaches and Cyber Attacks in March 2024 – 299,368,075 Records Breached
04 April 2024
·
Articles
An Expert Overview of CISM®
04 April 2024
·
Articles
The Week in Cyber Security and Data Privacy: 25 – 31 March 2024
02 April 2024
·
Articles
The Week in Cyber Security and Data Privacy: 18 – 24 March 2024
25 March 2024
·
Articles
The False Economy of Deprioritising Security
20 March 2024
·
Articles
The Week in Cyber Security and Data Privacy: 11 – 17 March 2024
18 March 2024
·
Articles
ISO 27001:2022 Annex A Controls Explained
13 March 2024
·
Articles
The Week in Cyber Security and Data Privacy: 4 – 10 March 2024
11 March 2024
·
Articles
Global Data Breaches and Cyber Attacks in February 2024 – 719,366,482 Records Breached
05 March 2024
·
Articles
The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024
05 March 2024
·
Articles
The Week in Cyber Security and Data Privacy: 19 – 25 February 2024
27 February 2024
·
Knowledge
Ashley Brett on Cyber Essentials Solutions
21 February 2024
·
Articles
The Week in Cyber Security and Data Privacy: 12 – 18 February 2024
21 February 2024
·
Articles
Maintaining GDPR and Data Privacy Compliance in 2024
16 February 2024
·
Articles
Sophie Sayer on the IT Governance Partner Programme
14 February 2024
·
Articles
The Week in Cyber Security and Data Privacy: 5 – 11 February 2024
14 February 2024
·
Articles
Your CVSS Questions Answered
09 February 2024
·
Articles
Elearning Staff Awareness Course Overview: Ransomware
07 February 2024
·
Articles
The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024
06 February 2024
·
Articles
Global Data Breaches and Cyber Attacks in January 2024 – 29,530,829,012 Records Breached
05 February 2024
·
Articles
Expert Insight: Vanessa Horton on Anti-Forensics
02 February 2024
·
Articles
The Week in Cyber Security and Data Privacy: 22 – 28 January 2024
30 January 2024
·
Articles
‘Mother of All Breaches’: 26 BILLION Records Leaked
24 January 2024
·
Articles
The Week in Cyber Security and Data Privacy: 15 – 21 January 2024
23 January 2024
·
Articles
The Week in Cyber Security and Data Privacy: 8 – 14 January 2024
16 January 2024
·
Articles
The Week in Cyber Security and Data Privacy: 1 – 7 January 2024
09 January 2024
·
Articles
List of Data Breaches and Cyber Attacks in 2023 – 8,214,886,660 records breached
05 January 2024
·
Articles
Global Data Breaches and Cyber Attacks in December 2023 – 2,241,916,765 Records Breached
05 January 2024
·
Articles
Expert Insight: Adam Seamons on Zero-Trust Architecture
05 January 2024
·
Articles
The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023
04 January 2024
·
Articles
The Third-Party Threat for Financial Organisations
22 December 2023
·
Knowledge
Sam McNicholls-Novoa on CyberComply
20 December 2023
·
Articles
The Week in Cyber Security and Data Privacy: 11 – 17 December 2023
19 December 2023
·
Articles
The Week in Cyber Security and Data Privacy: 4 – 10 December 2023
11 December 2023
·
Articles
Data Breaches and Cyber Attacks in November 2023 – 519,111,354 Records Breached
05 December 2023
·
Articles
The Week in Cyber Security and Data Privacy: 27 November – 3 December 2023
05 December 2023
·
Articles
Expert Insight: Cliff Martin
28 November 2023
·
Articles
The Week in Cyber Security and Data Privacy: 20 – 26 November 2023
28 November 2023
·
Articles
Alan Calder on Cyber Resilience
24 November 2023
·
Articles
Risk Management under the DORA Regulation
23 November 2023
·
Articles
The Week in Cyber Security and Data Privacy: 13 – 19 November 2023
20 November 2023
·
Articles
Catches of the Month: Phishing Scams for November 2023
17 November 2023
·
Articles
The Week in Cyber Security and Data Privacy: 6 – 12 November 2023
13 November 2023
·
Articles
The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023
06 November 2023
·
Articles
Expert Insight: Andrew Snow
06 November 2023
·
Articles
Data Breaches and Cyber Attacks in October 2023 – 867,072,315 Records Breached
03 November 2023
·
Articles
The Week in Cyber Security and Data Privacy: 23 – 29 October 2023
31 October 2023
·
Articles
Expert Insight: Stephen Hancock on SAQ SPoC
30 October 2023
·
Articles
The Week in Cyber Security and Data Privacy: 16 – 22 October 2023
24 October 2023
·
Articles
IT Governance Podcast 20.10.23: Casio, Cisco, MOVEit (again) and the ICC
23 October 2023
·
Articles
Catches of the Month: Phishing Scams for October 2023
13 October 2023
·
Articles
IT Governance Podcast 6.10.23: TikTok, Sony and MOVEit and DarkBeam
06 October 2023
·
Articles
List of Data Breaches and Cyber Attacks in September 2023 – 3,808,687,191 Breached Records
05 October 2023
·
Articles
Royal Family’s Website Targeted by Denial-of-Service Attack
02 October 2023
·
Articles
IT Governance Podcast 22.09.23: MGM Resorts, Microsoft Azure, International Criminal Court
22 September 2023
·
Articles
MGM Resorts suffers ransomware infection following social engineering attack
18 September 2023
·
Articles
Catches of the Month: Phishing Scams for September 2023
15 September 2023
·
Articles
IT Governance Podcast 08.09.23: Electoral Commission (again), Meta, Pôle emploi
07 September 2023
·
Articles
List of Data Breaches and Cyber Attacks in August 2023 – 79,729,271 Records Breached
06 September 2023
·
Articles
IT Governance Podcast 25.8.23: Tesla, Duolingo, Lapsus$ trial
24 August 2023
·
Articles
IT Governance Podcast 11.8.23: Electoral Commission, PSNI, Capita
10 August 2023
·
Articles
Catches of the Month: Phishing Scams for August 2023
07 August 2023
·
Articles
What is Vishing? Definition, Examples and Prevention
03 August 2023
·
Articles
List of Data Breaches and Cyber Attacks in July 2023 – 146 Million Records Breached
01 August 2023
·
Articles
What is Tailgating? Definition, Examples & Prevention
27 July 2023
·
Articles
Norwegian Government Hit by Widespread Cyber Attack
24 July 2023
·
Articles
What is Smishing? Definition, Examples and Prevention
19 July 2023
·
Articles
IT Governance Podcast 14.7.23: EU-US DPF, UK-US data bridge, MOVEit patches and other security fixes
13 July 2023
·
Articles
Red Team vs Blue Team: What’s the Difference?
13 July 2023
·
Articles
Data Breaches and Cyber Attacks Quarterly Review: Q2 2023
11 July 2023
·
Articles
Catches of the Month: Phishing Scams for July 2023
06 July 2023
·
Articles
List of Data Breaches and Cyber Attacks – June 2023
04 July 2023
·
Articles
IT Governance Podcast 30.6.23: ChatGPT, LetMeSpy and MS Teams, plus Alan Calder on cyber security
29 June 2023
·
Articles
Phone-Tracking App LetMeSpy Says It Has Been Hacked
29 June 2023
·
Articles
How to Recover From a Cyber Attack
27 June 2023
·
Articles
100,000 ChatGPT Accounts Hacked in Malware Attack
22 June 2023
·
Articles
10 Ways to Prevent Phishing Attacks in 2023
21 June 2023
·
Articles
IT Governance Podcast 16.6.23: MOVEit, LinkedIn, Spotify and Google Bard
15 June 2023
·
Articles
Ofcom Becomes the Latest Victim of MOVEit Supply Chain Attack
15 June 2023
·
Articles
API Penetration Testing Checklist
13 June 2023
·
Articles
51 Must-Know Phishing Statistics for 2023
08 June 2023
·
Articles
Catches of the Month: Phishing Scams for June 2023
06 June 2023
·
Articles
IT Governance Podcast 2.6.23: Capita, NHS, Meta, GDPR, DPDI Bill and Alan Calder on cyber regtech
01 June 2023
·
Articles
List of Data Breaches and Cyber Attacks – May 2023
01 June 2023
·
Articles
What is a DoS Attack?
31 May 2023
·
Knowledge
GDPR Article 32: Your Guide to the Requirements
23 May 2023
·
Articles
IT Governance Podcast 19.5.23: A Capita special, featuring pension providers, Colchester City Council and Alan Calder’s analysis
18 May 2023
·
Articles
What Is a Brute Force Attack? Definition, Prevention and Examples
17 May 2023
·
Articles
Eurovision Organisers Concerned About the Threat of Cyber Attacks
11 May 2023
·
Knowledge
Cyber Essentials Pricing in 2023: What You Need to Know
10 May 2023
·
Articles
Catches of the Month: Phishing Scams for May 2023
10 May 2023
·
Articles
IT Governance Podcast 5.5.23: ChatGPT, LockBit, T-Mobile and Alan Calder on cyber security for boards
04 May 2023
·
Articles
List of Data Breaches and Cyber Attacks in April 2023 – 4.3 Million Records Breached
02 May 2023
·
Articles
World Economic Forum: Organisations Must Invest in Security as ‘Catastrophic Cyber Event’ Looms
27 April 2023
·
Articles
IT Governance Podcast 21.4.23: Capita, Chrome, LockBit for Macs and Alan Calder on cyber security
20 April 2023
·
Articles
Capita Admits That Its ‘Cyber Incident’ Was Ransomware and That Customer Data Was Breached
20 April 2023
·
Articles
What Is Data Minimisation? Definition & Examples
18 April 2023
·
Articles
Data Breaches and Cyber Attacks Quarterly Review: Q1 2023
13 April 2023
·
Articles
April 2023’s Catch of the Month: Uncovering Phishing Scams
11 April 2023
·
Articles
IT Governance Podcast 2023-7: Capita, ChatGPT and TikTok (yet again)
05 April 2023
·
Articles
How to Prevent Malware Attacks: 8 Tips for 2023
05 April 2023
·
Articles
List of Data Breaches and Cyber Attacks in March 2023 – 41.9 Million Records Breached
03 April 2023
·
Knowledge
GDPR Article 17: What Is the Right to Erasure?
30 March 2023
·
Articles
Data Backups Are for Life, Not Just for World Backup Day
28 March 2023
·
Articles
IT Governance Podcast 2023-6: Ferrari, Dole, TikTok (again), Android
23 March 2023
·
Articles
TikTok Banned on UK Government Devices
16 March 2023
·
Articles
3 reasons cyber security training is essential
09 March 2023
·
Articles
IT Governance Podcast 2023-5: WH Smith, the Data Protection and Digital Information Bill, TikTok
09 March 2023
·
Articles
Catches of the Month: Phishing Scams for March 2023
07 March 2023
·
Knowledge
Cyber Essentials is Updating its Technical Requirements
02 March 2023
·
Articles
List of Data Breaches and Cyber Attacks in February 2023 – 29.5 Million Records Breached
01 March 2023
·
Articles
IT Governance Podcast 2023-4: EU-US Data Privacy Framework, Twitter 2FA, GoDaddy, HardBit 2.0
23 February 2023
·
Articles
Twitter’s Security Move: Charging Users for SMS Two-Factor Authentication
23 February 2023
·
Articles
Is Pepsi Okay? Bottling Plant Suffers Malware Attack
16 February 2023
·
Articles
IT Governance Podcast 2023-3: Bank security flaws ranked, ION ransom paid, MP hacked
09 February 2023
·
Articles
Phishing Alert: February 2023’s Notable Scams
07 February 2023
·
Articles
How to Investigate a Cyber Incident: 5-Step Guide
02 February 2023
·
Articles
List of Data Breaches and Cyber Attacks in January 2023 – 277.6 Million Records Breached
01 February 2023
·
Articles
IT Governance Podcast 2023-2: Mailchimp, fast food, T-Mobile, ice rinks, iOS update and ISO 27001
26 January 2023
·
Articles
What Are You Doing for Data Protection Day?
25 January 2023
·
Articles
NortonLifeLock Says Customer Accounts were Compromised in Credential-Stuffing Attack
19 January 2023
·
Articles
7 Ways to Avoid Physical Security Threats in the Workplace
17 January 2023
·
Articles
IT Governance Podcast 2023-1: more ransomware attacks on the education sector, and DPC and Meta sued
13 January 2023
·
Articles
Catches of the Month: Phishing Scams for January 2023
12 January 2023
·
Articles
Data Breaches and Cyber Attacks in 2022: 480 Million Breached Records
10 January 2023
·
Articles
Criminal Hackers Leak Email Addresses of 220 Million Twitter Users
05 January 2023
·
Articles
List of data breaches and cyber attacks in December 2022 – 31.5 million records breached
03 January 2023
·
White Papers
GDPR – A compliance guide
17 August 2021
·