Police Scotland needs to invest millions in cyber security
Police Scotland needs to invest £206 million in its computer systems to adequately tackle the threat of cyber crime, according to the force’s deputy chief officer. Appearing before the SPA (Scottish...
View ArticleCyber resilience in Scotland: combating cyber crime
The Scottish government unveiled its cyber resilience strategy in 2015, with the aim of helping Scotland’s people, businesses and public sector improve their ability to use technology securely, and...
View Article39% of UK CEOs admit that cyber attacks are unavoidable
A new study has found that 39% of British organisations’ CEOs believe that a successful cyber attack on their company is inevitable. This figure reflects the upsurge in cyber attacks over the past few...
View ArticleWhy you should be concerned about security incidents… even if you have a BCMS
As you might expect, the BCI Horizon Scan Report 2018 found that the majority of business continuity professionals were “concerned” or “extremely concerned” about the threat of cyber attacks and data...
View ArticleThe NIS Regulations: Why cyber resilience is crucial
The NIS Regulations (The Network and Information Systems Regulations 2018) became UK law on 10 May 2018, paving the way for the widespread adoption of cyber resilience. Cyber resilience is an approach...
View ArticleBecome cyber resilient with a BCMS
With the ever-present threat of cyber crime, your organisation can’t afford to be lax about cyber security. This doesn’t just entail using the latest technological defences and enrolling your staff on...
View ArticleWhat is business continuity/ISO 22301 and why do you need it?
You might already have a BCP (business continuity plan) – or other contingency plan – in place in the event of a disruptive incident, such as a natural disaster. However, because these plans aren’t...
View ArticleDo you have a data breach response plan?
The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the...
View ArticleHow business continuity contributes to your organisation’s cyber resilience
Organisations are starting to realise that it’s impossible to prevent every cyber security threat they face, and are turning their attention towards more sophisticated ways of protecting themselves....
View ArticleMPs concerned about the UK’s cyber security
MPs across all parties have serious fears about the UK’s cyber security defences, according to a YouGov survey. Among 100 surveyed MPs, 62 believe there is a serious risk of critical national...
View ArticleThe hidden threats facing your intellectual property
When we consider the damage a data breach can cause, we tend to focus on the cost of breach reporting, potential fines and loss of reputation. One of the ‘unseen’ costs is the potential loss or theft...
View ArticleCyber resilience in the Scottish public sector: meeting the Cyber Essentials...
Protecting Scotland’s digital networks and infrastructure, and ensuring they are resilient to cyber attacks, is essential to the country’s prosperity and reputation. The Scottish government therefore...
View ArticleCyber resilience: What does this mean for Scotland?
Organisations face an increasing number of threats from ransomware, data breaches and weaknesses in the supply chain, according to the NCSC’s (National Cyber Security Centre) annual report published...
View ArticleHow Cyber Essentials can help secure your Internet connection
In this blog series, we will discuss each of the Cyber Essentials scheme’s five security controls that, according to the UK government, could prevent “around 80% of cyber attacks”. For our second blog...
View ArticleHow to detect a data breach
The need for speed Data breaches can have serious financial consequences for organisations of all sizes. The faster a breach can be detected and contained, the lower the costs for the organisation....
View ArticleHow Scottish organisations can ensure business continuity in a cyber world
As winter draws in, Scottish organisations will be preparing for the harsher weather and its knock-on effects. With last year’s severe conditions costing Scotland’s economy hundreds of millions of...
View ArticleHow Lush could have protected its till system
In November, Lush – the high-street store known for its fragrant, eco-friendly beauty products – temporarily lost the ability to take card transactions after a member of the IT team “deleted the till...
View ArticleSafely adopting technology in the hospitality industry
The hospitality sector has embraced consumer-facing technology. Chatbots, AI, robotics – such as Hilton’s robot concierge, Connie, which hit the headlines in 2016 – the IoT (Internet of Things),...
View ArticleThe 4 stages of cyber resilience
Until recently, organisations often spent almost all of their information security budget on prevention, effectively taking an all-or-nothing approach to the threat of data breaches. They either...
View ArticleDo you have a data breach response plan?
This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches...
View Article