Information Security Blogs | Everything you need to know
  • UK International Data Transfer Agreement

    UK International Data Transfer Agreement On 2 February 2022, the Information Commissioner’s Office (ICO) laid before Parliament changes around restricted international personal data transfers. The international data transfer agreement (IDTA) and the UK Addendum to the current European Commission’s standard contractual clauses (SCCs) are the next steps in providing a transfer tool for complying with […]

  • PCI SSC Remote Assessment Guidelines and Procedures – Key Questions Answered

    PCI SSC Remote Assessment Guidelines and Procedures The PCI SCC has recently released a new remote assessment guidelines and procedures. Here we address a number of key questions: What are the Main Contents? A set of principles and procedures which govern how remote assessments of compliance with PCI SSC standards such as PCI DSS must […]

  • cyber essentials, cyber essentials plus, iasme cyber essentials, ncsc cyber security, cyber security, cyber security testing, essential security, essential plus,

    Cyber Essentials FAQs

    Cyber Essentials – (FAQs) What is Cyber Essentials? Cyber Essentials is a Government-backed scheme aimed at helping organisations protect themselves against common Internet-based cyber attacks. Certification to Cyber Essentials provides reassurance that your security controls will protect against the vast majority of common cyber attacks, and will act as a significant deterrent to cyber criminals. […]

  • soc, socs, soc compliance, soc 2, soc 2 requirements, soc 2 type

    SOC 2 Compliance Requirements

    SOC 2 Understanding and Navigating SOC 2 Requirements In this blog, we will take a look at System and Organization Controls requirements and audits. Starting with a description of what SOC 2 is, we will then explore the different types and scopes of a SOC 2 compliance assessment. What is SOC 2? The SOC 2 […]