

7 Min
What is incident response?
Gain insights into incident response: its key stages, strategies, and how it can empower your organisation to fight cybersecurity threats.
Read More7 Min
Gain insights into incident response: its key stages, strategies, and how it can empower your organisation to fight cybersecurity threats.
Read More5 Min
A Business Continuity Plan (BCP) mock drill tests the effectiveness of your BCP. Find out what's behind such a mock drill and how to run one successfully.
Read More5 Min
Business continuity plans (BCP) often fail, exposing your organisation to risks. Find out the main reasons why BCPs fail and what you can do to prevent it.
Read More7 Min
Find out how to prepare a Business Continuity Plan (BCP) in your organisation, including best practices, clear steps and mistakes to avoid.
Read More6 Min
Whenever personal data is processed by a service provider on behalf of a data controller and in accordance with their instructions, a DPA is required.
Read More8 Min
Learn what an Information Security Management System (ISMS) is and how it can help your organisation protect its information assets.
Read More3 Min
To build trusted-based relationships with customers, organisations must address them with clear and consistent policies that make the benefits visible.
Read More5 Min
Who is actually liable when it comes to compliance and data protection? The data controller or the data processor? Find the answer in this article.
Read More5 Min
Technical and organisational measures (TOM) determine which precautions a company takes for the security of personal data. Read more about it here.
Read More5 Min
In case of a reportable data breach as defined in the UK GDPR, you have 72 hours to inform the appropriate supervisory authority. Find a reaction plan here
Read More