Quantcast
Channel: Cyber Resilience – IT Governance UK Blog
Browsing all 92 articles
Browse latest View live

Police Scotland needs to invest millions in cyber security

Police Scotland needs to invest £206 million in its computer systems to adequately tackle the threat of cyber crime, according to the force’s deputy chief officer. Appearing before the SPA (Scottish...

View Article


Cyber resilience in Scotland: combating cyber crime

The Scottish government unveiled its cyber resilience strategy in 2015, with the aim of helping Scotland’s people, businesses and public sector improve their ability to use technology securely, and...

View Article


39% of UK CEOs admit that cyber attacks are unavoidable

A new study has found that 39% of British organisations’ CEOs believe that a successful cyber attack on their company is inevitable. This figure reflects the upsurge in cyber attacks over the past few...

View Article

Why you should be concerned about security incidents… even if you have a BCMS

As you might expect, the BCI Horizon Scan Report 2018 found that the majority of business continuity professionals were “concerned” or “extremely concerned” about the threat of cyber attacks and data...

View Article

The NIS Regulations: Why cyber resilience is crucial

The NIS Regulations (The Network and Information Systems Regulations 2018) became UK law on 10 May 2018, paving the way for the widespread adoption of cyber resilience. Cyber resilience is an approach...

View Article


Become cyber resilient with a BCMS

With the ever-present threat of cyber crime, your organisation can’t afford to be lax about cyber security. This doesn’t just entail using the latest technological defences and enrolling your staff on...

View Article

Image may be NSFW.
Clik here to view.

What is business continuity/ISO 22301 and why do you need it?

You might already have a BCP (business continuity plan) – or other contingency plan – in place in the event of a disruptive incident, such as a natural disaster. However, because these plans aren’t...

View Article

Do you have a data breach response plan?

The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations:  taking the...

View Article


How business continuity contributes to your organisation’s cyber resilience

Organisations are starting to realise that it’s impossible to prevent every cyber security threat they face, and are turning their attention towards more sophisticated ways of protecting themselves....

View Article


Image may be NSFW.
Clik here to view.

MPs concerned about the UK’s cyber security

MPs across all parties have serious fears about the UK’s cyber security defences, according to a YouGov survey. Among 100 surveyed MPs, 62 believe there is a serious risk of critical national...

View Article

Image may be NSFW.
Clik here to view.

The hidden threats facing your intellectual property

When we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation. One of the ‘unseen’ costs is the potential loss or theft...

View Article

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials...

Protecting Scotland’s digital networks and infrastructure, and ensuring they are resilient to cyber attacks, is essential to the country’s prosperity and reputation. The Scottish government therefore...

View Article

Image may be NSFW.
Clik here to view.

Cyber resilience: What does this mean for Scotland?

Organisations face an increasing number of threats from ransomware, data breaches and weaknesses in the supply chain, according to the NCSC’s (National Cyber Security Centre) annual report published...

View Article


How Cyber Essentials can help secure your Internet connection

In this blog series, we will discuss each of the Cyber Essentials scheme’s five security controls that, according to the UK government, could prevent “around 80% of cyber attacks”. For our second blog...

View Article

Image may be NSFW.
Clik here to view.

How to detect a data breach

The need for speed Data breaches can have serious financial consequences for organisations of all sizes. The faster a breach can be detected and contained, the lower the costs for the organisation....

View Article


Image may be NSFW.
Clik here to view.

How Scottish organisations can ensure business continuity in a cyber world

As winter draws in, Scottish organisations will be preparing for the harsher weather and its knock-on effects. With last year’s severe conditions costing Scotland’s economy hundreds of millions of...

View Article

How Lush could have protected its till system

In November, Lush – the high-street store known for its fragrant, eco-friendly beauty products – temporarily lost the ability to take card transactions after a member of the IT team “deleted the till...

View Article


Image may be NSFW.
Clik here to view.

Safely adopting technology in the hospitality industry

The hospitality sector has embraced consumer-facing technology. Chatbots, AI, robotics – such as Hilton’s robot concierge, Connie, which hit the headlines in 2016 – the IoT (Internet of Things),...

View Article

The 4 stages of cyber resilience

Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either...

View Article

Image may be NSFW.
Clik here to view.

Do you have a data breach response plan?

This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches...

View Article
Browsing all 92 articles
Browse latest View live