In the context of an organization’s Information Security Management System (ISMS), interested parties refer to individuals or entities who have a vested interest in the success of the organization’s ISMS, either positively or negatively. While most...
Following the *proposed changes to the UK GDPR via the Data Protection Bill, Terry B Glover has worked hard to produce a ‘Keelingesque’ mark up of the UK GDPR as impacted by the proposed changes in the DPDI (No. 2) Bill. You can download the comparison for...
At our workplaces, we probably hear often about keeping customers and clients, and even employees’ data safe and secure. Do you ever have the conversation or even think about ‘Your’ own personal data and how to keep it safe? We live in an ever-growing digital world...
Overview of the Cyber Essentials Certification Scheme The Cyber Essentials certification scheme is backed by the UK government. Its aim is that the certification will help organisations of any size stay protected against a range of common cyber-attacks. The Cyber...
What is Phishing? The term phishing is mainly used to describe attacks that arrive by email. These emails are created to look like it has come from a trusted source. Phishing can either land in your inbox as part of an untargeted mass email campaign...
A strong password is normally a string of characters that are required for an authentication process. For most of us, this authentication process will be accessing a variety of online accounts. Some of these online accounts will hold some of our most sensitive data....