Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

How to Investigate a Cyber Incident: 5-Step Guide

...available. Where relevant, you must also notify law enforcement and regulators about the data breach. 4. Analyse the data Once you’ve gathered the relevant information about the cyber incident, you...

Post

The NIS Directive and NIS Regulations

...about DSP requirements Comparable to breaches under the GDPR (General Data Protection Regulation) and DPA (Data Protection Act) 2018, organisations must report “significant” or “substantial” incidents to their competent authority...

Post

Strategies for Securing Your Supply Chain

...like ISO 27001 and the PCI DSS [Payment Card Industry Data Security Standard]. What if your supplier doesn’t have such certification? You could get an independent third party to assess...

Post

Where to Start with Cyber Security Risk Management

Risk management lies at the heart of security. Virtually every best-practice framework and law related to cyber security or data privacy takes a fundamentally risk-based approach, including: The UK and...

Post

100,000 ChatGPT Accounts Hacked in Malware Attack

...the compromised data within the logs of info-stealing malware traded on various underground websites. Info-stealers are a form of malware that target account data stored on web browsers. This can...