
In this blog, we aim to provide 10 top tips to enable you to keep important information assets safe and secure whilst working remotely.

For all of us, email can be both a blessing and a curse. On one hand you have the speed and convenience of communication....

Many organisations have had to adapt very quickly to the rapidly changing restrictions brought in across the globe to help combat the spread of COVID-19.

We are going to explore why the focus on a risk-based approach has helped turn ISO 27001, the International ISM Standard, into such a world-beater.

With the news often including stories regarding high-profile information security breaches, many of us find ourselves asking how we can avoid it.

The purpose of ISO 27002 is to provide organisations with guidance on selecting, implementing and managing information security controls.

Annex A of ISO 27001 comprises 114 controls which are grouped into the following 14 control categories.

A key role of risk management is helping organisations decide how limited resources can be most effectively used to address the most pressing business issues.

‘How do we approach asset identification within our information security risk assessment?’. This blog examines which assets or asset types to include.

ISO 27001 is a standard for Information Security Management that provides any organisation with a framework to protect most valuable assets.
As a long-established PCI QSA, URM is able to deliver a full PCI QSA-led audit and produce a report on compliance (RoC) as well as deliver a full QSA-led self-assessment questionnaire (SAQ)
By attending URM’s online BCS Foundation Certificate in Data Protection course, you will gain valuable insights into the key aspects of current DP legislation including rights of data subjects and data controller obligations.
If uncertain, URM is able to conduct a high-level GDPR gap analysis which will assist you understand your current levels of compliance and identify gaps and vulnerabilities.