5 Min
10 types of cybersecurity for businesses in the UK
The rise in cybercrime is a growing concern. Read on to learn the different types of cyber security and how to protect your data in an organisation.
Read More
5 Min
The rise in cybercrime is a growing concern. Read on to learn the different types of cyber security and how to protect your data in an organisation.
Read More
3 Min
Download and use the Cyber Essentials Checklist & SAQ (Self-Assessment Questionnaire) to check if you're ready for Cyber Essentials Certification.
Read More
6 Min
Data mapping not only allows compliance with the UK GDPR but also ensures that organisations understand every aspect of using personal data. Read more.
Read More
3 Min
If you want to protect your company against cyber threats by getting cyber insurance, you’ll need to be prepared. Learn how ISO 27001 can help you here.
Read More
2 Min
PECR is a set of rules governing the use of electronic communications and services. Learn more about PECR and how it can help your organisation.
Read More
5 Min
The penetration testing phase of ISO 27001 will ensure full security for your ISMS and eliminate potentially harmful gaps in your system. Learn more.
Read More
4 Min
All about ISO 22301, the certification for business continuity management. Discover why ISO 23001 matters, its benefits and compliance requirements.
Read More
4 Min
First-party data: What does it say about the quality of your data, and what is second-party and third-party data?
Read More
3 Min
For achieving the TISAX® label, companies must first complete the TISAX® audit. We explain how this works best and also suggest valuable tips.
Read More
2 Min
Level 1, 2 or 3 - which is the right one in the assessment on TISAX®? Get an overview of which level your organisation should aim for in the assessment.
Read More