October 6, 2020

Ransomware encrypts files on the infected system or network. It then demands a ransom to decrypt the infected files. It often charges in bitcoin. What often happens ...

Read More

September 21, 2020

COVID-19 has revolutionised the flexibility of work, whether that is working from home or in public. But it has also significantly increased the use of public Wi-Fi and other insecure methods ...

Read More

September 14, 2020

If the risk of a data breach in third-parties increases, so can the risks of a breach in fourth- and fifth- parties. That is why ...

Read More

September 4, 2020

PCI-DSS or Payment Card Industry Data Security Standard is an information security standard for organisations that handle branded credit cards from the major card schemes. It is ...

Read More

September 2, 2020

We have learnt many lessons and experienced numerous frustrations from years of doing Third-Party Risk Management.  This has prompted us to develop what we believe is the most complete ...

Read More

August 25, 2020

Cloud computing is the on-demand availability of computer system resources over the internet. It has become more and more prevalent due to the user’s ability to access data ...

Read More

August 19, 2020

What is incident response (IR)? For any organisation, the threat of attack or breach is an exponentially growing risk that faces SME organisations all the way up to enterprise level. Each company has different incidents that ...

Read More

August 17, 2020

If you don’t think your company has a strategy where employees use their own devices for work it may be happening anyway; the chances are that they do use their ...

Read More

July 21, 2020

Supply chain risk management, or Vendor Risk Management, encompasses the coordinated efforts of an organisation to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability. In many ...

Read More