Get a quote

Resources

We have all the free resources you need to understand every aspect of implementing and maintaining best-practice security and governance in compliance with a wide range of laws, regulations and standards.

  • Categories

  • Topic

  • Reset

Fact sheets

12 top tips to prevent data loss

01 May 2026

Blog

PCI DSS

Do You Need to Comply with the PCI DSS? A Practical Guide for Businesses

01 May 2026

Red team assessment report showing cyber security testing data and attack analysis

Blog

Cyber incident response

Data Protection

GDPR

Quantifying the Chaos: Assessing a Data Breach’s Risk to Individuals

01 May 2026

Brochures

Training

Challenges for Accountancy Firms in 2026 – A Guide

30 April 2026

Blog

Cyber Essentials

How to Get Cyber Essentials Certified in 2026: Updated Steps and Key Changes

27 April 2026

Blog

Cyber Resilience

Cyber Security

DSPT

The NHS DSPT (Data Security and Protection Toolkit): What You Need to Know for 2025/26

23 April 2026

Brochures

Training

Training Brochure 2026

14 April 2026

Brochures

Cyber Essentials

Cyber Essentials Checklist

14 April 2026

Blog

Cyber Security

ISO 27001

Risk Management

7 Steps to a Successful ISO 27001 Risk Assessment

14 April 2026

Blog

Cyber Essentials

Cyber Essentials 2026 FAQs: What’s Changing and How to Prepare

13 April 2026

Blog

Data Protection

GDPR

Privacy

UK Mandatory Data Protection Complaints Handling Process: What Organisations Must Do by 19 June 2026

09 April 2026

White papers

Cyber Essentials

Cyber Essentials – 2026 Scheme Changes: What You Need to Know

01 April 2026

Blog

DORA

Are Cookies Personal Data under the GDPR? A Guide to Cookie Compliance

30 March 2026

Blog

Cyber Security

Penetration Testing

Security Testing

How Long Does a Penetration Test Take?

30 March 2026

Blog

Cyber Essentials

Cyber Security

Cyber Security for Companies: The Essential Guide to Getting Secure in 2026

26 March 2026

Blog

Cyber Security

Penetration Testing

Security Testing

When Trusted Tools Become the Attack Vector: What the Trivy and LiteLLM Attacks Mean for You

26 March 2026

Blog

Cyber Security

The Socio-Technical Playbook: Practical Patterns for Security Culture

25 March 2026

Blog

Data Protection

GDPR

The Complete Guide to Conducting a GDPR and Data Protection Audit

25 March 2026