Cyber security risk assessments

Cyber security risk assessments

Every organisation faces security risks and must therefore implement robust cyber security controls. Cyber security risk assessments are used to assess those controls to ensure they are appropriate. Today then we look more closely at these important aspects of any...
What is DPO as a service?

What is DPO as a service?

Introduction The role of the DPO or Data Protection Officer is to ensure that the company processes personal data in accordance with applicable data protection rules, including Data Protection Impact Assessments (DPIA). The data concerned are those of its staff,...
Cyber security quotes to blow your mind

Cyber security quotes to blow your mind

This week we decided to list out some of our favourite cyber security quotes. Some may well ‘blow your mind’, whilst others may merely brighten up your day. Whatever the end result, if nothing else we hope you’ll think about security in a slightly...
Cyber security threats 2023

Cyber security threats 2023

In the wake of the pandemic, many people now work remotely either on a permanent or hybrid basis. As such, there has been a marked increase in security risks as companies struggle to maintain a consistent infrastructure. Cyber-criminal activity is also on the rise,...
Cyber security news Oct 2022

Cyber security news Oct 2022

It is November and time for a look back at some of the key stories to have emerged last month. Cyber security news Oct 2022 features Germany releasing then cybersecurity chief Arne Schönbohm ‘over Russia ties’. Then we move onto the release of a new Google...
Penetration testing definition

Penetration testing definition

One of our core IT security products, penetration tests are incredibly useful when evaluating a computer system’s level of security. We have produced articles on pen testing before but today we present you with a penetration testing definition. Definition...