ISO 42001 and AI Perspectives
URM’s blog explores ISO 42001, its intentions and structure, and the AI perspectives that will need to be considered by organisations implementing the Standard.
If your organisation is looking to transition to ISO 27001:2022, URM’s blog provides practical and invaluable guidance on meeting the new requirements.
Some organisations are using artificial intelligence (AI) to help respond to DSARs. But can AI provide a full and robust solution?
The consequences of unauthorised access are varied. Apart from financial losses, there is a loss of customer confidence. Can penetration testing prevent this?
We are answering questions: what is a GDPR DSAR, what information can a data subject request, what should you do when you receive a DSAR, and many more.
3rd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.
2nd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.
URM delivered a question and answer session where it compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.
URM provides some top tips for achieving an effective and successful information security management system implementation
In this blog, we are discussing the top 10 ways in which URM believes COVID-19 has impacted, influenced or affected business continuity (BC).
This blog considers at high-level various possible legal ramifications of using Chatbots, especially ChatGPT, concerned with data protection risks.
URM is sharing its experiences on how the changes to the PCI DSS v4 affect the assessment process and how organisations can best prepare for the differences.
After the recent changes to PCI DSS v4.0 we're examining factors behind the greater utilisation of MFA, and what the key changes are in requirements.
When looking to comply with the General Data Protection Regulation (GDPR), it is always a worthwhile exercise....
On 23 January 2023, NCSC published an updated set of requirements, v.3.1 for the Cyber Essentials scheme....
Following the publication of ISO/IEC 27001:2022 on 25 October 2022, this blog will provide you with our high-level analysis of the key changes.
For all of us, email can be both a blessing and a curse. On one hand you have the speed and convenience of communication....
We are hearing a lot about phishing and phishing attacks currently so, in this blog, we will take a step back....
Almost all organisations that implement the Payment Card Industry Data Security Standard (PCI DSS) struggle with the scope of the applicability....
In this blog, we address one of the big questions facing organisations which accept payment cards....
In recent blogs, we have focused on how best to ensure you comply with the PCI Data Security Standard....
Having been involved in over 350 successful ISO 27001 certifications, URM is ideally placed to advise you on the essential activities and tasks you will need to carry out in order to maintain and improve your ISO 27001 auditing function and programme
URM can conduct penetration tests on mobile apps that are deployed to either Apple IOS or Android devices, typically against the OWASP MASVS, but also under the CREST OVS framework where required.
URM can offer a range of support services when applying for Cyber Essentials Certification. Check our offer!