Information Security Blogs | Everything you need to know
  • soc, socs, soc compliance, soc 2, soc 2 requirements, soc 2 type

    SOC 2 Compliance Requirements

    Understanding and Navigating SOC 2 Requirements In this blog, we will take a look at Service Organization Control (SOC 2) requirements and audits. Starting with a description of what SOC 2 is, we will then explore the different types and scopes of a SOC 2 compliance assessment. What is SOC 2? The SOC 2 security […]

  • Data Transfer Risk Assessment, gdpr risk assessment template, transfer risk, data risk assessment, transfer the risk

    Data Transfer Risk Assessment (TRA)

    Data Transfer Risk Assessment In our previous post on the Schrems II judgement, we explored the wider implications for transfering personal data between the EU and the US and the implications for the UK in a post-Brexit world. In this blog, we are focussing on transfer risk assessments (TRAs) and, having provided some of the […]

  • Information Security Risks - Tips for Working From Home, security risks, Home Office Security, home cyber security, cyber security tips, home cyber, information security, iso 27001

    Information Security Risks – Tips for Working From Home

    As more employees settle into the ‘new normal’ of home working, organisations need to be extra vigilant to the increase in cyber and other security-related risks attached to online and remote working. Whilst most home workers can use secure Wi-Fi connections, this is not the case for everyone. Some still need to use unsecured public […]

  • ISO 27001 - Most Frequently Asked Questions, iso 27001 audit questions, most frequently asked questions, iso 27001 questions, iso 27001 certification, cost iso audit questions, iso 27001 guide, iso 27001 information security, iso 27001

    ISO 27001 – Most Frequently Asked Questions

    ISO 27001 – Most Frequently Asked Questions What is ISO 27001? To give it its full title, ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements is an international standard published by the International Organisation for Standardisation (ISO). What is ISO 27001 For? ISO 27001 provides a standardised approach that […]

  • ICO issues enforcement notice to Experian

    Credit reporting agency found to be using personal data for marketing purposes without data subjects’ consent The Information Commissioner’s Office (ICO) has issued an enforcement notice to Experian, the credit reporting agency, asking it to make changes on how it handles personal data within its direct marketing services. The ICO has given Experian 9 months […]

  • What is the GDPR?, Understand how to comply with the General Data Protection Regulation, General Data Protection Regulation (GDPR), data protection act, data protection principles, what is the gdpr, data protection act, gdpr data protection, gdpr principles

    What is the GDPR?

    The General Data Protection Regulation (EU) 2016/679 (GDPR) is an EU regulation which came into effect on 25 May 2018 and has set a new benchmark for the processing of personal data. It applies to any organisation that is processing the personal information of data subjects inside the EEA. The Data Protection Act (DPA) 2018 sits alongside […]

  • The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid…but with Conditions, services, consultancy, data protection, data privacy, EU-US Privacy shield, CJEU, SCCs, gdpr, Court of Justice of the European Union

    The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid…but with Conditions

    What are the Implications and Next Steps for Your Organisation? On 16 July 2020, the Court of Justice of the European Union (CJEU) issued its judgement on the adequacy of both the Privacy Shield and standard contract clauses (SCCs). The EU-US Privacy Shield is a mechanism that enables participating companies to meet the EU requirements for […]