Knowledge
Knowledge
ISO 27001
What is Cyber Security? Definition and Best Practices
28 November 2025
Knowledge
ISO 27001
UK Government Minimum Cyber Security Standard
28 November 2025
Knowledge
ISO 27001
Transitioning to ISO 27001:2022 | GRC Solutions
28 November 2025
Knowledge
ISO 27001
SWIFT CSCF Compliance | IT Governance Ltd
28 November 2025
Knowledge
ISO 27001
Speak to a cyber security expert
28 November 2025
Knowledge
ISO 27001
What is Social Engineering? Examples & Prevention Tips
28 November 2025
Knowledge
ISO 27001
Securities and Exchange Commission Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
28 November 2025
Knowledge
ISO 27001
The Sarbanes-Oxley Act | GRC Solutions
27 November 2025
Knowledge
ISO 27001
What is Phishing? Attack Techniques & Prevention Tips
27 November 2025
Knowledge
ISO 27001
NIST Cybersecurity Framework (CSF) | GRC Solutions
27 November 2025
Read our Information Resources
Test Gated Post
01 December 2025
ISO 27001
What is Cyber Security? Definition and Best Practices
28 November 2025
ISO 27001
UK Government Minimum Cyber Security Standard
28 November 2025
ISO 27001
Transitioning to ISO 27001:2022 | GRC Solutions
28 November 2025
ISO 27001
SWIFT CSCF Compliance | IT Governance Ltd
28 November 2025
ISO 27001
Speak to a cyber security expert
28 November 2025
ISO 27001
What is Social Engineering? Examples & Prevention Tips
28 November 2025
ISO 27001
Securities and Exchange Commission Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
28 November 2025
ISO 27001
The Sarbanes-Oxley Act | GRC Solutions
27 November 2025
ISO 27001
What is Phishing? Attack Techniques & Prevention Tips
27 November 2025
ISO 27001
NIST Cybersecurity Framework (CSF) | GRC Solutions
27 November 2025
ISO 27001
Operators of Essential Services and the NIS Regulations
27 November 2025
ISO 27001
Digital Service Providers and the NIS Regulations
26 November 2025
ISO 27001
NIS Regulations: Cyber Assessment Framework
26 November 2025
ISO 27001
The NIS Directive and NIS Regulations
26 November 2025
ISO 27001
Management system integration
26 November 2025
ISO 27001
ITSM (IT Service Management)
26 November 2025
ISO 27001
GRC Solutions ITIL and ITSM books
26 November 2025
ISO 27001
ITIL®
26 November 2025
ISO 27001
IT Governance: definition & explanation
26 November 2025
ISO 27001
ISO 27701
26 November 2025
ISO 27001
ISO 27017 and ISO 27018 Cloud security | GRC Solutions
26 November 2025
ISO 27001
ISO 27005
26 November 2025
ISO 27001
ISO 27001 Risk Assessments
26 November 2025
ISO 27001
FastTrackâ„¢ | ISO 27001 | GRC Solutions
26 November 2025
ISO 27001
Typical ISO 27001 certification costs
26 November 2025
ISO 27001
Key Benefits of ISO 27001 Certification
26 November 2025
ISO 27001
ISO/IEC 27001:2022 and ISO/IEC 27002:2022
26 November 2025
ISO 27001
iso27001 2022 transition training
26 November 2025
ISO 27001
ISO27001
26 November 2025
ISO 27001
iso27000 family
26 November 2025
ISO 27001
ISO22301 business continuity standard
26 November 2025
ISO 27001
ISO20000
21 November 2025
ISO 27001
ISO9001 Quality Management Standards
21 November 2025
ISO 27001
ISMS Benefits
21 November 2025
ISO 27001
Infosec
21 November 2025
ISO 27001
Implementing ISO27001
21 November 2025
ISO 27001
GDPR and ISO 27001
21 November 2025
ISO 27001
Gambling Commission Compliance
21 November 2025
ISO 27001
Federal Cybersecurity and Privacy Laws
21 November 2025
ISO 27001
EU Digital Operational Resilience Act
21 November 2025
ISO 27001
EU Cybersecurity Act
21 November 2025
ISO 27001
Email Security
21 November 2025
ISO 27001
DFARS
21 November 2025
ISO 27001
Data Classification Software
21 November 2025
ISO 27001
Cyber Threats
21 November 2025
ISO 27001
Cyber Security Standards
21 November 2025
ISO 27001
Cyber Security Risk Management
21 November 2025
ISO 27001
Cyber Security Risk Assessment
21 November 2025
ISO 27001
Cyber Security Consultancy Services
21 November 2025
ISO 27001
Cyber Resilience Framework
21 November 2025
ISO 27001
Cyber Resilience
20 November 2025
ISO 27001
Cyber Incident Response
20 November 2025
ISO 27001
Cyber Crime
20 November 2025
ISO 27001
Compliance
20 November 2025
ISO 27001
Cloud Security
20 November 2025
ISO 27001
Capability Maturity Model
20 November 2025
ISO 27001
Business Resilience
20 November 2025
ISO 27001
Benefits of ISO 22301
20 November 2025
ISO 27001
BC DR
20 November 2025
ISO 27001
Advanced Persistent Threats APT
20 November 2025
ISO 27001
Accredited Certification
20 November 2025
SOC 2
SOC reporting
20 November 2025
GDPR
The pecr and eu eprivacy directive
20 November 2025
GDPR
GDPR privacy compliance framework and standards
20 November 2025
GDPR
GDPR Data Mapping
20 November 2025
GDPR
GDPRConsultancy
20 November 2025
GDPR
GDPR Compliance with ISO 27001
20 November 2025
GDPR
GDPR Anniversary
20 November 2025
GDPR
ePrivacy Regulation EPR
20 November 2025
GDPR
DPO as a Service
20 November 2025
GDPR
DPA and GDPR penalties
20 November 2025
GDPR
GDPR Gap Analysis
19 November 2025
GDPR
DPA 2018 part 4 intelligence processing
19 November 2025
GDPR
DPA 2018 part 3 law enforcement processing
19 November 2025
GDPR
DPA 2018
19 November 2025
GDPR
Data subject access requests
19 November 2025
GDPR
Data Sovereignty and the Cloud
19 November 2025
GDPR
Data protection officer dpo under the gdpr
19 November 2025
GDPR
Data Protection dpa and eu data protection regulation
19 November 2025
GDPR
Data Protection
19 November 2025
GDPR
Data Privacy
19 November 2025
GDPR
Data Governance
19 November 2025
GDPR
Data Breaches
19 November 2025
GDPR
Articles of the GDPR
19 November 2025
PCI DSS
PCI DSS | What It Is and How to Comply
19 November 2025
Cyber Essentials
Vulnerability testing for Cyber Essentials
19 November 2025
Cyber Essentials
Cyber Essentials: Secure Configuration
19 November 2025
Cyber Essentials
Cyber Essentials: Patch Management
19 November 2025
Cyber Essentials
Cyber Essentials: Malware Protection
19 November 2025
Cyber Essentials
ISO 27001 and the Cyber Essentials Scheme
19 November 2025
Cyber Essentials
Defining the scope for Cyber Essentials certification
19 November 2025
Cyber Essentials
The Cyber Essentials Scheme
19 November 2025
Cyber Essentials
Cyber Essentials Repeat Testing and Assessment Fees
18 November 2025
Cyber Essentials
The Cyber Essentials SAQ (Self-Assessment Questionnaire)
18 November 2025
Cyber Essentials
Cyber Essentials for the MOD Supply Chain
18 November 2025
Cyber Essentials
Cyber Essentials FAQs
18 November 2025
Cyber Essentials
Cyber Essentials Benefits
18 November 2025
Cyber Essentials
Cyber Essentials: Boundary Firewalls and Internet Gateways
18 November 2025
Cyber Essentials
Cyber Essentials Plus Case Study
18 November 2025
Cyber Essentials
Cyber Essentials: User Access Control
18 November 2025
AI Governance
What is AI governance and why does it matter?
18 November 2025
AI Governance
ISO 42001: What it is and why it matters for AI management
18 November 2025
AI Governance
The EU AI Act: what it means for your organisation and how to comply
18 November 2025
CISSP study planner
18 November 2025
IT Standards | GRC Solutions
18 November 2025
Become an GRC Solutions channel partner
18 November 2025
Ethical Hacking Career Roadmap
17 November 2025
Cyber Essentials – 2025 Scheme Changes: What You Need to Know
17 November 2025
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in October 2025 – At Least 21.2 Million Breached Records
14 November 2025
Uncategorised
GRC Solutions Named Among the UK’s Top 20 Cyber Security Innovators
14 November 2025
ISO 27001
Uncategorised
Data Leakage Prevention and Data Deletion – ISO 27001 Controls 8.12 and 8.12 Explained
13 November 2025
ISO 27001
Threat Intelligence – ISO 27001:2022 Control 5.7 Explained
06 November 2025
DORA
ISO 27001
Training
How DORA fits with ISO 27001, NIS2 and the GDPR
03 November 2025
Cyber Security
Training
CISM Exam Tips from a Consultant: Five Insider Insights to Help You Pass
03 November 2025
ISO 27001
How To Comply with ISO 27001’s New Cloud Services Control
03 November 2025
DORA
What DORA Means for ICT Suppliers: MSPs, SaaS and Cloud in Scope
31 October 2025
Cyber Essentials
Cyber Security Must Be a Board Priority – And It Starts With Cyber Essentials
28 October 2025
ISO 27001
Training
Top 5 Skills Every ISO 27001 Internal Auditor Needs
22 October 2025
Business Continuity
Cyber Security
DORA
ISO 22301
NIS Regulations
AWS Outage: A Supply-Chain Security Lesson
21 October 2025
Cyber Security
Global Encryption Day: Why Encryption Is a Core Requirement
21 October 2025
Business Continuity
Cyber Resilience
Cyber Security
Expert insight
ISO 27001
Risk Management
Why You Need Cyber Resilience and Defence in Depth
21 October 2025
ISO 27001
ISO 27001:2022 Clause 6 – What’s Changed and What You Need to Do About It
21 October 2025
Cyber Security
4 reasons to get CISMP qualified
20 October 2025
Cyber Security
Training
CISM vs CISSP: Which Certification is Right for You in 2025
17 October 2025
Cyber Security
Training
CISMP vs Security+: Which Certification is Right for You in 2025?
15 October 2025
ISO 27001
Training
ISO 27001 for Non-IT Roles: A Beginner’s Guide
15 October 2025
Uncategorised
CRISC Salary & Career in the UK: What to Expect in 2025
10 October 2025
Uncategorised
5 Practical Skills You’ll Gain from a GDPR Practitioner Course
10 October 2025
ISO 27001
Training
ISO 27001 Internal vs Lead Auditor Training Compared
10 October 2025
Uncategorised
Global Data Breaches and Cyber Attacks in September 2025: Nearly 2 Million Records Exposed and Potentially 1.5 Billion More
08 October 2025
Cyber Security
Training
Is CISM Worth It? Salary, Career Value & Employer Demand in 2025
06 October 2025
GDPR
Privacy
Training
5 Common GDPR Mistakes – and How Training can Fix Them
06 October 2025
ISO 27001
Training
5 Reasons ISO 27001 Implementations Fail (and How to Avoid Them)
03 October 2025
Cyber Security
News
Our Experts’ Views on the Jaguar Land Rover Cyber Attack
01 October 2025
Data Protection
GDPR
A Guide to the EU GDPR’s Requirements for an EU Representative
01 October 2025
GDPR
Privacy
Training
Who Needs ISO 27001 Foundation Training?
01 October 2025
Data Protection
GDPR
Privacy
Human Error and Accidental Data Breaches: Lessons from Recent Cases
01 October 2025
Privacy
Training
How to Become a DPO (Data Protection Officer) in the UK
29 September 2025
Uncategorised
How to Get Cyber Essentials Certified in 2025: Updated Steps and Key Changes
26 September 2025
GDPR
Training
GDPR Foundation vs Awareness Training: Which is Right for Your Team?
25 September 2025
The Data Protection Officer (DPO) Role – A beginner’s guide
25 September 2025
Cyber Security
Training
CISSP® Exam Myths: What Learners Get Wrong
22 September 2025
Uncategorised
UK GDPR Representative Services: What You Need to Know
19 September 2025
ISO 27001
How to Maintain ISO 27001 Certification: 7 Top Tips
16 September 2025
Cyber Security
ISO 27001
Supply chain security
3 ISO 27001:2022 Controls That Help Secure Your Cloud Services
15 September 2025
DORA
ISO 27001
How ISO 27001 Helps You Comply With DORA
15 September 2025
Free White Paper: The EU AI Act and ISO 42001 – A Beginner’s Guide
13 September 2025
Data Protection
GDPR
GDPR Data Protection Impact Assessments: The 7 Key Stages of the DPIA Process
10 September 2025
Uncategorised
Global Data Breaches and Cyber Attacks in August 2025: over 17.3 million records exposed
08 September 2025
Cyber Essentials
Cyber Security
Cyber Essentials: The 5 Cost-Effective Security Controls Everyone Needs
19 August 2025
Cyber Security
SOC 2
Nine Steps to SOC 2 Compliance – Including a SOC 2 Readiness Checklist
14 August 2025
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in July 2025: over 14.9 million records exposed
12 August 2025
Data Protection
Privacy
Data Protection Enforcement: Your Cookie Compliance Questions Answered
08 August 2025
GDPR
A Guide to TOMs (Technical and Organisational Measures) Under the GDPR
06 August 2025
Cyber Security
Expert insight
Penetration Testing
Security Testing
What are the Different Types of Penetration Test?
05 August 2025
GDPR
The Six Data Processing Principles of the UK GDPR Explained
01 August 2025
Cyber Security
Training
The 4 CRISC Domains Explained
28 July 2025
Cyber Security
ISO 27001
Supply chain security
What Are ISO 27017 and ISO 27018, and What Are Their Controls?
23 July 2025
Cyber Security
Training
The 9 CISMP Domains Explained
21 July 2025
News
How One Weak Password Destroyed a 158-Year-Old Company
21 July 2025
GDPR
Nine Steps to Conducting a GDPR Gap Analysis
18 July 2025
Cyber Essentials
Are You Ready for Cyber Essentials?
18 July 2025
GDPR
How to Write a GDPR Data Retention Policy – with template
16 July 2025
Cyber Security
Training
The 4 CISM Domains Explained
14 July 2025
PCI DSS
Choosing the Right PCI DSS SAQ: A Practical Guide
11 July 2025
Cyber Security
Information Security vs Cyber Security: The Difference
09 July 2025
Cyber Security
Training
The 5 CISA Domains Explained
07 July 2025
AI
How ISO 42001 supports EU AI Act compliance
04 July 2025
Uncategorised
Global Data Breaches and Cyber Attacks in June 2025: Over 16 billion records exposed
04 July 2025
Cyber Security
ISO 27001
Risk Management
7 Steps to a Successful ISO 27001 Risk Assessment (Updated for 2025)
02 July 2025
Data Protection
GDPR
How to Write a GDPR Data Protection Policy (Updated for 2025)
01 July 2025
Cyber Security
Training
Building Your Cyber Security Career: The Credentials Needed for Management and Specialist Roles
30 June 2025
GDPR
How to Respond to a DSAR (Data Subject Access Request)Â
30 June 2025
Data Protection
GDPR
How to Write a GDPR Data Privacy Notice – Updated Guide and Template for 2025
24 June 2025
Data Protection
GDPR
Privacy
The Critical Role of a DPO: Why Outsourcing is the Smart Choice
20 June 2025
Data Protection
GDPR
Privacy
The Data (Use and Access) Act and How it Affects the UK GDPR and DPA 2018, and PECR
19 June 2025
Cyber Security
Understanding the CIA Triad in 2025: A Cornerstone of Cyber Security
18 June 2025
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in May 2025 – More Than 1.4 Billion Records Breached
17 June 2025
Cyber Security
Penetration Testing
Penetration Testing for SaaS Providers: Building Trust and Security
12 June 2025
Uncategorised
How to Start Your Career in Data Protection and Privacy
10 June 2025
Data Protection
GDPR
GDPR Documentation: The Documents You Need to Comply with the UK and EU GDPR
09 June 2025
ISO 27001
How to FastTrack your ISO 27001 ISMS Implementation and Certification
05 June 2025
Author of the month
Cyber Security
ISO 27001
Staff Awareness
Author of the Month: Bridget Kenyon
04 June 2025
Data Protection
CCTV and the GDPR in 2025: What Employers Must Know
03 June 2025
GDPR
The GDPR in 2025: What’s the Difference between Personal Data and Special Category Data?
03 June 2025
Data Protection
Privacy
Data Protection Gap Analysis: Identifying Weak Spots Before Regulators Do
29 May 2025
Cyber Security
GDPR
Penetration Testing
Security Testing
Lessons Learned from the Legal Aid Agency Data Breach
22 May 2025
Cyber Security
Phishing
How to Spot a Phishing Email in 2025 –with Real Examples and Red Flags
16 May 2025
Cyber Security
Penetration Testing
Security Testing
The Co-op, M&S, Harrods… You? Mitigating the Risk of Ransomware
13 May 2025
Training
The 8 CISSP domains explained
08 May 2025
Expert insight
Windows 10 End of Life: What Does it Mean for Your Organisation?
02 May 2025
Author of the month
Cyber Resilience
Cyber Security
Cyber Terrorism
ISO 22301
ISO 27001
NIST
Author of the Month: Richard Bingley
01 May 2025
Author of the month
Cyber Resilience
Cyber Security
ISO 22301
ISO 27001
Author of the Month: Andrew Pattison
01 April 2025
Cyber Essentials
The Cyber Essentials Scheme’s 2025 Update and What it Means for Your Organisation
20 March 2025
Data Protection
GDPR
Privacy
Training
What It Takes to Be Your Organisation’s DPO or Data Privacy Lead
20 January 2025
Expert insight
Free Expert Insights: Index of Interviews
15 January 2025
Expert insight
ISO 27001
How Can Organisations Transition to ISO 27001:2022?
14 January 2025
Expert insight
Penetration Testing
Security Testing
Training
The Benefits of Becoming an Ethical Hacker
13 January 2025
Data Protection
GDPR
Step-by-Step Guide to Achieving GDPR Compliance
08 January 2025
ISO 27001
How You Can Continually Improve Your ISO 27001 ISMS (Clause 10)
06 January 2025
Data Protection
GDPR
Privacy
How a GDPR Gap Analysis Helps Secure Support From Senior Management
11 December 2024
Cyber Security
Expert insight
ISO 27001
Risk Management
How to Select Effective Security Controls
09 December 2024
Breaches and Hacks
Cyber Security
Data Protection
Phishing
Cyber Threats During the Holidays: How to Stay Safe From Seasonal Scams and Data Breaches
04 December 2024
Cyber Essentials
Expert insight
ISO 27001
Cyber Essentials vs ISO 27001: Key Differences
02 December 2024
Expert insight
Penetration Testing
Security Testing
Staff Awareness
Meet the Hacker: How Simulated Phishing Addresses Your Biggest Security Risk
27 November 2024
Cyber Security
Expert insight
Penetration Testing
Security Testing
Breaking In to Keep Hackers Out: The Essential Work of Penetration Testers
25 November 2024
Cyber Essentials
Cyber Security
Expert insight
How Do the Cyber Essentials and Cyber Essentials Plus Assessments Work?
20 November 2024
Cyber Security
Staff Awareness
How to Create a Strong Security Culture
18 November 2024
Cyber Security
Expert insight
Phishing
Staff Awareness
Your Biggest Security Risk: The Insider Threat
13 November 2024
AI
Cyber Security
Expert insight
Privacy
Layering Defences to Safeguard Sensitive Data Within AI Systems
11 November 2024
Data Protection
Expert insight
GDPR
Privacy
How Organisations Are Failing to Process Personal Data Lawfully Under the GDPR
04 November 2024
Cyber Security
Training
The 6 CCSP Domains Explained
30 October 2024
Data Protection
GDPR
Privacy
GDPR: International Data Transfers Using the IDTA, SCCs or BCRs
28 October 2024
Cyber Security
Expert insight
ISO 27001
Supply chain security
Strategies for Securing Your Supply Chain
23 October 2024
Cyber Security
Supply chain security
How to Meet the NCSC’s 14 Cloud Security Principles
21 October 2024
Cyber Security
Expert insight
Penetration Testing
Security Testing
The Insider Threat: Strategies to Safeguard Against Malicious Insiders
16 October 2024
Data Protection
GDPR
Privacy
GDPR: Data Subject Rights and Organisations’ Responsibilities
14 October 2024
Data Protection
Expert insight
GDPR
Privacy
How Do You Demonstrate Accountability Under the GDPR?
08 October 2024
Cyber Security
Supply chain security
Security Risks of Outsourcing to the Cloud: Who’s Responsible?
03 October 2024
PCI DSS
7 Steps to Prepare for PCI DSS Audit Success
01 October 2024
Staff Awareness
How to Overcome Unconscious Bias in the Workplace
24 September 2024
GDPR Benchmark Report: Compliance Insights
17 September 2024
PCI DSS
8 Ways to Reduce Your PCI DSS Compliance Burden
17 September 2024
AI
Cyber Security
Expert insight
ISO 27001
Security Testing
How to Address AI Security Risks With ISO 27001
12 September 2024
Staff Awareness
How to Write a Modern Slavery Statement – 6-Step Guide
10 September 2024
Cyber Security
Expert insight
Risk Management
How Do You Mitigate Information Security Risk?
05 September 2024
Cyber Security
Expert insight
Risk Management
Where to Start with Cyber Security Risk Management
29 August 2024
Staff Awareness
Tips for Environmental Sustainability at Work and How ISO 14001 Can Help
27 August 2024
Cyber Essentials
Cyber Security
ISO 27001
What Is Access Control and Why Do Cyber Essentials and ISO 27001 Require It?
21 August 2024
Data Protection
GDPR
Privacy
A Guide to GDPR International Transfers
20 August 2024
PCI DSS
Supply chain security
Online Merchants: PCI DSS Compliance Tips When Outsourcing
15 August 2024
Staff Awareness
Are You Meeting Your Occupational Health & Safety Requirements?
13 August 2024
CyberComply
Data Protection
Expert insight
GDPR
Privacy
Streamlining GDPR Compliance With ROPAs, Data Flow Maps and DPIAs
08 August 2024
Cyber Security
Expert insight
ISO 27001
5 Cyber Security and ISO 27001 Myths
01 August 2024
Business Continuity
Cyber Resilience
Expert insight
Supply chain security
CrowdStrike: Lessons on the Importance of Contracts, Insurance and Business Continuity
30 July 2024
PCI DSS
Staff Awareness
How to Easily Meet the PCI DSS Awareness Training Requirements
25 July 2024
Expert insight
ISO 27001
ISO 27001:2022 Transition Challenges and How to Use ISO 27002
18 July 2024
Breaches and Hacks
Data Protection
Staff Awareness
Analysing Data Breaches Caused by Human Error
16 July 2024
PCI DSS
The Good, the Bad and the Improvable of PCI DSS v4
11 July 2024
Breaches and Hacks
Expert insight
News
Penetration Testing
Security Testing
‘RockYou2024’: Nearly 10 BILLION Unique Plaintext Passwords Leaked
10 July 2024
Data Protection
Expert insight
GDPR
Privacy
Supply chain security
GDPR Article 28 Contracts: What You Need to Know
09 July 2024
Data Protection
Expert insight
GDPR
Privacy
Records of Processing Activities (ROPAs): Simplifying GDPR Compliance
04 July 2024
Cyber Security
Expert insight
Phishing
Ransomware
Security Trends for 2024 and Beyond
28 June 2024
AI
Creating an AI Policy – A Guide for SMEs
10 June 2024
Cyber Security
Expert insight
Ransomware
Worrying Ransomware Trends, and What to Do About Them
07 June 2024
Expert insight
Penetration Testing
Security Testing
Security Tips and Concerns for Remote Working
31 May 2024
Cyber incident response
Cyber Resilience
Cyber Security
Expert insight
A Practical Guide to Cyber Incident Response
24 May 2024
Expert insight
ISO 27001
ISO 27001 and Physical Security
15 May 2024
The Week in Cyber Security and Data Privacy
6,009,014 MovieBoxPro Accounts Breached in Another Data Scraping Incident
07 May 2024
Breaches and Hacks
Cyber Security
Monthly Data Breaches and Cyber Attacks
News
Global Data Breaches and Cyber Attacks in 2024
02 May 2024
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in April 2024 – 5,336,840,757 Records Breached
02 May 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 22 – 28 April 2024
29 April 2024
Channel Partners
Looking Back on the Channel Partner Event and Awards 2024
24 April 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 15 – 21 April 2024
22 April 2024
Cyber Security
Cyber Defence in Depth: An Expert’s Overview
19 April 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 8 – 14 April 2024
15 April 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 1 – 7 April 2024
09 April 2024
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in March 2024 – 299,368,075 Records Breached
04 April 2024
Cyber Security
Training
An Expert Overview of CISM®
04 April 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 25 – 31 March 2024
02 April 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 18 – 24 March 2024
25 March 2024
Cyber Security
The False Economy of Deprioritising Security
20 March 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 11 – 17 March 2024
18 March 2024
ISO 27001
ISO 27001:2022 Annex A Controls Explained
13 March 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 4 – 10 March 2024
11 March 2024
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in February 2024 – 719,366,482 Records Breached
05 March 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024
05 March 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 19 – 25 February 2024
27 February 2024
Cyber Essentials
Ashley Brett on Cyber Essentials Solutions
21 February 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 12 – 18 February 2024
21 February 2024
Cyber Security
CyberComply
Expert insight
Privacy
Maintaining GDPR and Data Privacy Compliance in 2024
16 February 2024
Channel Partners
Sophie Sayer on the IT Governance Partner Programme
14 February 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 5 – 11 February 2024
14 February 2024
Cyber Security
Expert insight
Penetration Testing
Your CVSS Questions Answered
09 February 2024
Ransomware
Staff Awareness
Elearning Staff Awareness Course Overview: Ransomware
07 February 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024
06 February 2024
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in January 2024 – 29,530,829,012 Records Breached
05 February 2024
Expert insight
Expert Insight: Vanessa Horton on Anti-Forensics
02 February 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 22 – 28 January 2024
30 January 2024
Expert insight
News
Security Testing
‘Mother of All Breaches’: 26 BILLION Records Leaked
24 January 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 15 – 21 January 2024
23 January 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 8 – 14 January 2024
16 January 2024
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 1 – 7 January 2024
09 January 2024
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in 2023 – 8,214,886,660 records breached
05 January 2024
Monthly Data Breaches and Cyber Attacks
Global Data Breaches and Cyber Attacks in December 2023 – 2,241,916,765 Records Breached
05 January 2024
Cyber Security
Expert insight
Expert Insight: Adam Seamons on Zero-Trust Architecture
05 January 2024
The Week in Cyber Security and Data Privacy
The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023
04 January 2024
Cyber Resilience
Cyber Security
DORA
Risk Management
Supply chain security
The Third-Party Threat for Financial Organisations
22 December 2023
Cyber Security
CyberComply
GDPR
ISO 27001
Privacy
Sam McNicholls-Novoa on CyberComply
20 December 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 11 – 17 December 2023
19 December 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 4 – 10 December 2023
11 December 2023
Monthly Data Breaches and Cyber Attacks
Data Breaches and Cyber Attacks in November 2023 – 519,111,354 Records Breached
05 December 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 27 November – 3 December 2023
05 December 2023
DORA
Expert insight
Expert Insight: Cliff Martin
28 November 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 20 – 26 November 2023
28 November 2023
Cyber Resilience
Alan Calder on Cyber Resilience
24 November 2023
DORA
Risk Management under the DORA Regulation
23 November 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 13 – 19 November 2023
20 November 2023
Catches of the Month
Catches of the Month: Phishing Scams for November 2023
17 November 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 6 – 12 November 2023
13 November 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023
06 November 2023
Expert insight
Expert Insight: Andrew Snow
06 November 2023
Monthly Data Breaches and Cyber Attacks
Data Breaches and Cyber Attacks in October 2023 – 867,072,315 Records Breached
03 November 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 23 – 29 October 2023
31 October 2023
Expert insight
Expert Insight: Stephen Hancock on SAQ SPoC
30 October 2023
The Week in Cyber Security and Data Privacy
The Week in Cyber Security and Data Privacy: 16 – 22 October 2023
24 October 2023
Podcast
IT Governance Podcast 20.10.23: Casio, Cisco, MOVEit (again) and the ICC
23 October 2023
Catches of the Month
Catches of the Month: Phishing Scams for October 2023
13 October 2023
Podcast
IT Governance Podcast 6.10.23: TikTok, Sony and MOVEit and DarkBeam
06 October 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in September 2023 – 3,808,687,191 Breached Records
05 October 2023
News
Royal Family’s Website Targeted by Denial-of-Service Attack
02 October 2023
Podcast
IT Governance Podcast 22.09.23: MGM Resorts, Microsoft Azure, International Criminal Court
22 September 2023
News
MGM Resorts suffers ransomware infection following social engineering attack
18 September 2023
Catches of the Month
Catches of the Month: Phishing Scams for September 2023
15 September 2023
Podcast
IT Governance Podcast 08.09.23: Electoral Commission (again), Meta, Pôle emploi
07 September 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in August 2023 – 79,729,271 Records Breached
06 September 2023
Podcast
IT Governance Podcast 25.8.23: Tesla, Duolingo, Lapsus$ trial
24 August 2023
Podcast
IT Governance Podcast 11.8.23: Electoral Commission, PSNI, Capita
10 August 2023
Catches of the Month
Catches of the Month: Phishing Scams for August 2023
07 August 2023
Uncategorised
What is Vishing? Definition, Examples and Prevention
03 August 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in July 2023 – 146 Million Records Breached
01 August 2023
Uncategorised
What is Tailgating? Definition, Examples & Prevention
27 July 2023
News
Norwegian Government Hit by Widespread Cyber Attack
24 July 2023
Phishing
What is Smishing? Definition, Examples and Prevention
19 July 2023
Podcast
IT Governance Podcast 14.7.23: EU-US DPF, UK-US data bridge, MOVEit patches and other security fixes
13 July 2023
Penetration Testing
Red Team vs Blue Team: What’s the Difference?
13 July 2023
Monthly Data Breaches and Cyber Attacks
Data Breaches and Cyber Attacks Quarterly Review: Q2 2023
11 July 2023
Catches of the Month
Catches of the Month: Phishing Scams for July 2023
06 July 2023
Uncategorised
List of Data Breaches and Cyber Attacks – June 2023
04 July 2023
Podcast
IT Governance Podcast 30.6.23: ChatGPT, LetMeSpy and MS Teams, plus Alan Calder on cyber security
29 June 2023
News
Phone-Tracking App LetMeSpy Says It Has Been Hacked
29 June 2023
Cyber Security
How to Recover From a Cyber Attack
27 June 2023
News
100,000 ChatGPT Accounts Hacked in Malware Attack
22 June 2023
Phishing
10 Ways to Prevent Phishing Attacks in 2023
21 June 2023
Podcast
IT Governance Podcast 16.6.23: MOVEit, LinkedIn, Spotify and Google Bard
15 June 2023
News
Ofcom Becomes the Latest Victim of MOVEit Supply Chain Attack
15 June 2023
Penetration Testing
API Penetration Testing Checklist
13 June 2023
Phishing
51 Must-Know Phishing Statistics for 2023
08 June 2023
Catches of the Month
Catches of the Month: Phishing Scams for June 2023
06 June 2023
Podcast
IT Governance Podcast 2.6.23: Capita, NHS, Meta, GDPR, DPDI Bill and Alan Calder on cyber regtech
01 June 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks – May 2023
01 June 2023
Cyber Security
What is a DoS Attack?
31 May 2023
GDPR
GDPR Article 32: Your Guide to the Requirements
23 May 2023
Podcast
IT Governance Podcast 19.5.23: A Capita special, featuring pension providers, Colchester City Council and Alan Calder’s analysis
18 May 2023
Uncategorised
What Is a Brute Force Attack? Definition, Prevention and Examples
17 May 2023
News
Eurovision Organisers Concerned About the Threat of Cyber Attacks
11 May 2023
Cyber Essentials
Cyber Essentials Pricing in 2023: What You Need to Know
10 May 2023
Catches of the Month
Catches of the Month: Phishing Scams for May 2023
10 May 2023
Podcast
IT Governance Podcast 5.5.23: ChatGPT, LockBit, T-Mobile and Alan Calder on cyber security for boards
04 May 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in April 2023 – 4.3 Million Records Breached
02 May 2023
Cyber Security
World Economic Forum: Organisations Must Invest in Security as ‘Catastrophic Cyber Event’ Looms
27 April 2023
Uncategorised
IT Governance Podcast 21.4.23: Capita, Chrome, LockBit for Macs and Alan Calder on cyber security
20 April 2023
News
Capita Admits That Its ‘Cyber Incident’ Was Ransomware and That Customer Data Was Breached
20 April 2023
Cyber Security
What Is Data Minimisation? Definition & Examples
18 April 2023
Monthly Data Breaches and Cyber Attacks
Data Breaches and Cyber Attacks Quarterly Review: Q1 2023
13 April 2023
Catches of the Month
April 2023’s Catch of the Month: Uncovering Phishing Scams
11 April 2023
Podcast
IT Governance Podcast 2023-7: Capita, ChatGPT and TikTok (yet again)
05 April 2023
Cyber Security
How to Prevent Malware Attacks: 8 Tips for 2023
05 April 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in March 2023 – 41.9 Million Records Breached
03 April 2023
GDPR
GDPR Article 17: What Is the Right to Erasure?
30 March 2023
Cyber Security
Data Backups Are for Life, Not Just for World Backup Day
28 March 2023
Podcast
IT Governance Podcast 2023-6: Ferrari, Dole, TikTok (again), Android
23 March 2023
News
TikTok Banned on UK Government Devices
16 March 2023
Cyber Security
Training
3 reasons cyber security training is essential
09 March 2023
Podcast
IT Governance Podcast 2023-5: WH Smith, the Data Protection and Digital Information Bill, TikTok
09 March 2023
Catches of the Month
Catches of the Month: Phishing Scams for March 2023
07 March 2023
Cyber Essentials
Cyber Essentials is Updating its Technical Requirements
02 March 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in February 2023 – 29.5 Million Records Breached
01 March 2023
Uncategorised
IT Governance Podcast 2023-4: EU-US Data Privacy Framework, Twitter 2FA, GoDaddy, HardBit 2.0
23 February 2023
News
Twitter’s Security Move: Charging Users for SMS Two-Factor Authentication
23 February 2023
News
Is Pepsi Okay? Bottling Plant Suffers Malware Attack
16 February 2023
Uncategorised
IT Governance Podcast 2023-3: Bank security flaws ranked, ION ransom paid, MP hacked
09 February 2023
Catches of the Month
Phishing Alert: February 2023’s Notable Scams
07 February 2023
Cyber Security
How to Investigate a Cyber Incident: 5-Step Guide
02 February 2023
Monthly Data Breaches and Cyber Attacks
List of Data Breaches and Cyber Attacks in January 2023 – 277.6 Million Records Breached
01 February 2023
Podcast
IT Governance Podcast 2023-2: Mailchimp, fast food, T-Mobile, ice rinks, iOS update and ISO 27001
26 January 2023
Uncategorised
What Are You Doing for Data Protection Day?
25 January 2023
News
NortonLifeLock Says Customer Accounts were Compromised in Credential-Stuffing Attack
19 January 2023
Uncategorised
7 Ways to Avoid Physical Security Threats in the Workplace
17 January 2023
Uncategorised
IT Governance Podcast 2023-1: more ransomware attacks on the education sector, and DPC and Meta sued
13 January 2023
Catches of the Month
Catches of the Month: Phishing Scams for January 2023
12 January 2023
Uncategorised
Data Breaches and Cyber Attacks in 2022: 480 Million Breached Records
10 January 2023
News
Criminal Hackers Leak Email Addresses of 220 Million Twitter Users
05 January 2023
Monthly Data Breaches and Cyber Attacks
List of data breaches and cyber attacks in December 2022 – 31.5 million records breached
03 January 2023
Data Protection
GDPR
GDPR – A compliance guide
17 August 2021