Kyna Kosling Archive
Security risks of home working and public Wi-Fi, tips to mitigate them, VPN insights, and more Home-based teams? Flexible working? Staff often working on the go? Only a few years ago, most organisations never considered working from home as an …
Expert insight from our cyber incident responder Cyber attacks and data breaches are a matter of when, not if. No single measure is 100% foolproof. A determined attacker will always be able to find their way around your defences, given …
At least once a week, we sit down with an expert from within the Group to get their insights on a technical topic or business area. Here are all our Q&As to date, grouped by broad topic: AI Cyber attacks …
Physical access control, physical security monitoring, CCTV, and more When we hear the term ‘information security’ – or, for that matter, ‘ISO 27001’ – our thoughts usually turn straight to cyber security. However, physical security is also an important aspect …
IT Governance’s research found the following for April 2024: The number of records breached this month was high – particularly compared to March – largely due to two outlier events: We discuss both events in more detail below. Announcement: slight …
Previously, I had the pleasure of sitting down with Sophie Sayer, our Channel Sales Director, to talk about the IT Governance partner programme and partner event on 9 April 2024. Now that the drinks have been served and awards handed …
IT Governance’s research found the following for March 2024: This month saw fewer records breached than in February (a 58% drop), but a staggering 388% rise in incidents. This is largely caused by two outlier events: To minimise data skewing, …
In the UK, cyber security has been dropping down the board’s list of priorities. A 2022 Proofpoint study found that 76% of UK board members believed their organisation to be at risk of a material cyber attack in the next …
ISO 27001 is the international standard for information security. Its framework requires organisations to identify information security risks and select appropriate controls to tackle them. Clauses 4–10 of the Standard define the broader requirements for an ISMS (information security management system). …
IT Governance’s research found the following for February 2024: After January’s 29.5 billion records breached, following the MOAB (mother of all breaches), 719 million records for this month seems comparatively small. The number of records breached is also small compared …