Build or upgrade your ISMS on our platform

Month: February 2016

Sort by:

The great chain robbery – are suppliers your weakest link?

When we think of information security we often think of customer records and the financial risk of personal data leaks. But what about intellectual property? Just how much information do you share with your key suppliers, trusting that your collaborative relationship will continue, unchanged, long into the future?

Keep reading >

Ransomware and the ticking clock of cyber security

Ransomware is a nasty form of malware often delivered as an attachment to spammed email and, as such, it could be considered a time bomb waiting to explode in any organisation handling personal data or providing important services. Here are 5 general steps for addressing the ever-increasing threats of cyber attacks.

Keep reading >