September 2, 2020

We have learnt many lessons and experienced numerous frustrations from years of doing Third-Party Risk Management.  This has prompted us to develop what we believe is the most complete ...

Read More

August 25, 2020

Cloud computing is the on-demand availability of computer system resources over the internet. It has become more and more prevalent due to the user’s ability to access data ...

Read More

August 19, 2020

What is incident response (IR)? For any organisation, the threat of attack or breach is an exponentially growing risk that faces SME organisations all the way up to enterprise level. Each company has different incidents that ...

Read More

August 17, 2020

If you don’t think your company has a strategy where employees use their own devices for work it may be happening anyway; the chances are that they do use their ...

Read More

July 21, 2020

Supply chain risk management, or Vendor Risk Management, encompasses the coordinated efforts of an organisation to help identify, monitor, detect and mitigate threats to supply chain continuity and profitability. In many ...

Read More

July 14, 2020

According to recent research from EY, 30% of organisations have experienced a third-party breach in the last two years. That is why Vendor Risk Management (VRM) is now so important for all companies. But why should ...

Read More

July 7, 2020

What is Multi-factor Authentication?  Multi-Factor Authentication (MFA) is a security system that requires at least two authentication methods to ensure that the digital user is ...

Read More

July 3, 2020

You may have already asked yourself ‘How to implement a Vendor Risk Management (VRM) programme?’ Here you will find out how to implement it quickly. An ...

Read More

June 17, 2020

Privacy is an ever growing priority for managing the risk posture of an organisation. The increase in legislation and regulation globally is a good thing ...

Read More