Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Cyber Essentials: User Access Control

...data security. Put simply, access control is the selective restriction of access to data. It consists of two elements: Authentication – a technique used to verify the identity of a...

Post

GDPR privacy compliance framework and standards

The DPA (Data Protection Act) 2018 and UK GDPR (General Data Protection Regulation), and the EU GDPR require organisations to implement “appropriate technical and organisational measures” to secure the personal...

Post

SOC reporting

...might ask the service organisation to provide an assurance audit report, particularly if confidential or private data is entrusted to the service organisation. If your organisation provides Cloud services, a...

Post

IT Governance: definition & explanation

...governance enables an organisation to: Demonstrate measurable results against broader business strategies and goals. Meet relevant legal and regulatory obligations, such as those set out in the GDPR (General Data...

Post

ISO 27001 FastTrack Case Study

...data on PCs and mobile devices, tailgating, and the need to protect paper documents and prevent data leakage. Jacqueline Law, a corporate partner at Aberdein Considine, believes ISO 27001 certification...

Post

Top 5 Skills Every ISO 27001 Internal Auditor Needs

...impact justified? Are dependencies and supplier risks captured? Test the SoA against Annex A. Are the included controls implemented and monitored? Are exclusions justified? Check that monitoring and measurement data...