Information Security Blogs | Everything you need to know
  • PCI SSC Remote Assessment Guidelines and Procedures – Key Questions Answered

    PCI SSC Remote Assessment Guidelines and Procedures The PCI SCC has recently released a new remote assessment guidelines and procedures. Here we address a number of key questions: What are the Main Contents? A set of principles and procedures which govern how remote assessments of compliance with PCI SSC standards such as PCI DSS must […]

  • cyber essentials, cyber essentials plus, iasme cyber essentials, ncsc cyber security, cyber security, cyber security testing, essential security, essential plus,

    Cyber Essentials FAQs

    Cyber Essentials – (FAQs) What is Cyber Essentials? Cyber Essentials is a Government-backed scheme aimed at helping organisations protect themselves against common Internet-based cyber attacks. Certification to Cyber Essentials provides reassurance that your security controls will protect against the vast majority of common cyber attacks, and will act as a significant deterrent to cyber criminals. […]

  • soc, socs, soc compliance, soc 2, soc 2 requirements, soc 2 type

    SOC 2 Compliance Requirements

    SOC 2 Understanding and Navigating SOC 2 Requirements In this blog, we will take a look at System and Organization Controls requirements and audits. Starting with a description of what SOC 2 is, we will then explore the different types and scopes of a SOC 2 compliance assessment. What is SOC 2? The SOC 2 […]

  • Data Transfer Risk Assessment, gdpr risk assessment template, transfer risk, data risk assessment, transfer the risk

    Data Transfer Risk Assessment (TRA)

    Data Transfer Risk Assessment In our previous post on the Schrems II judgement, we explored the wider implications for transfering personal data between the EU and the US and the implications for the UK in a post-Brexit world. In this blog, we are focussing on transfer risk assessments (TRAs) and, having provided some of the […]

  • Information Security Risks - Tips for Working From Home, security risks, Home Office Security, home cyber security, cyber security tips, home cyber, information security, iso 27001

    Information Security Risks – Tips for Working From Home

    As more employees settle into the ‘new normal’ of home working, organisations need to be extra vigilant to the increase in cyber and other security-related risks attached to online and remote working. Whilst most home workers can use secure Wi-Fi connections, this is not the case for everyone. Some still need to use unsecured public […]

  • ISO 27001 - Most Frequently Asked Questions, iso 27001 audit questions, most frequently asked questions, iso 27001 questions, iso 27001 certification, cost iso audit questions, iso 27001 guide, iso 27001 information security, iso 27001

    ISO 27001 – Most Frequently Asked Questions

    ISO 27001 – Most Frequently Asked Questions What is ISO 27001? To give it its full title, ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements is an international standard published by the International Organisation for Standardisation (ISO). What is ISO 27001 For? ISO 27001 provides a standardised approach that […]