Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Cyber Essentials FAQs

...subsets have been segregated effectively. This may involve inspecting firewall or router ACLs (access control lists), or performing network scans between VLANs, subnets or zones to ensure proper segmentation. Vulnerability...

Post

Cyber Resilience Framework

Cyber resilience is the ability to prepare for, respond to and recover from a cyber attack. Although a relatively recent concept, it stems from the evolution of longstanding and well-understood...

Post

Gambling Commission Compliance

...payment cards comply with the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS imposes strict information security control requirements on all merchants that process payment cards, and...

Post

ISMS Benefits

...copy of ISO 27002:2022 here Secures your information in all forms An ISMS helps protect all forms of information, including digital, paper-based, intellectual property, company secrets, data on devices and...

Post

ISO9001 Quality Management Standards

...principle is key to ensuring quality standards are maintained and continually improved upon. Evidence-based decision making ISO 9001 emphasises evidence-based decision making, which uses data and objective evidence. This principle...

Post

How to Select Effective Security Controls

...down the drain. The same will apply to other healthcare, finance, and other industries that deal with lots of highly sensitive data. If you make no effort to keep it...

Post

How ISO 42001 supports EU AI Act compliance

...structured way. That’s where ISO 42001 comes in. It’s not a checklist or a set of rigid rules. It’s a management system – similar to ISO 27001, but designed specifically...

Post

ISO 27001 Series of Standards

...technology – Security techniques – Application security – Part 5: Protocols and application security controls data structure. Please contact us to buy your copy. ISO/IEC TS 27034-5-1:2018 (ISO 27034-5-1) Information...

Post

ISO/IEC 27001:2022 and ISO/IEC 27002:2022

...The completely new controls are: Threat intelligence Information security for use of Cloud services ICT readiness for business continuity Physical security monitoring Configuration management Information deletion Data masking Data leakage...