Your Search Results
Your search results for ‘list of data breaches’ returned 486 results
Cyber Essentials: Malware Protection
...often feature the use of a command-and-control server that allows attackers to communicate with the infected systems, exfiltrate sensitive data and remotely control the compromised device or server. An attack...
Implementing ISO 27001
...for managing information security, helping organisations protect sensitive data, reduce risks and meet their compliance requirements. It strengthens your security posture, builds trust and creates a resilient ISMS (information security...

Cyber Essentials vs ISO 27001: Key Differences
...access via password-based attacks – brute forcing, for example, or data scraping. These are basic, but extremely common, and can cause a lot of damage if successful, so implementing a...
NIST Cybersecurity Framework (CSF) | GRC Solutions
...for itself and its partners how it views cyber security risk and the degree of sophistication of its management approach. A Framework Profile is a list of outcomes that an...
Cyber Security Consultancy Services
...to data breaches, downtime and compliance failures. Our consulting service gives you clarity and confidence by: Identifying vulnerabilities in your physical and environmental security. Advising on best-practice controls from security...

How to Maintain ISO 27001 Certification: 7 Top Tips
...change in the way you perform certain actions? Have you undertaken new activities involving sensitive data? Has the physical premises changed in any way? If the answer to any of...

Your CVSS Questions Answered
...all breaches’, which saw more than 26 billion records leaked. Today, we’re chatting to him about the CVSS (Common Vulnerability Scoring System), finding out more about: What the framework is;...

Our Experts’ Views on the Jaguar Land Rover Cyber Attack
...you anticipate, or even simulate, a breach from different angles, you can start taking real steps to protect your data and your business as a whole. That might mean fixing...
What is Social Engineering? Examples & Prevention Tips
...a method attackers use to bypass technical defences by targeting people directly. It’s one of the most common ways data breaches occur. What does social engineering mean? Social engineering means...