Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

ISO 27001 and the Cyber Essentials Scheme

...by third parties. ISO/IEC 27001 is the best-known of these standards, detailing the requirements for an ISMS. What does it protect? Data and programs on networks, computers, servers and other...

Post

Cyber Resilience

...Once an attack has been successfully dealt with, organisations need to be able to recover their systems and data. This includes having backups in place and a plan for how...

Post

EU Digital Operational Resilience Act

...Trading venues. Trade repositories. Managers of alternative investment funds. Management companies. Data reporting service providers. Insurance and reinsurance undertakings. Insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries. Institutions for occupational...

Post

ISO20000

...the PCI DSS (Payment Card Industry Data Security Standard) and the Sarbanes-Oxley Act. Helps leverage ITIL practices to optimise resources and processes. Get your copy of the standard There are...

Post

Phishing Alert: February 2023's Notable Scams

...personal data. This month, we look at a UK government warning about a resurgence in Russian cyber attacks and concerns that the much-discussed AI programme ChatGPT could be used for fraud....