Blog
Recent blogs

ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and Conformance
Published on
16
December
2025
TRENDING
Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.
Read more
Information Security
Published on
24/4/2025
Quantum Computing – the Risks to Encryption and the Implications for PCI DSSTRENDING
URM’s blog explains the threat quantum computing poses to current encryption methods, how this may impact the PCI DSS, and how these challenges may be overcome.
Cyber Security
Published on
17/4/2025
Cyber Security and Resilience Bill Policy Statement – What to ExpectTRENDING
URM’s blog explains the measures the Bill will introduce, the entities it will bring into regulatory scope & what the Bill could mean for your organisation.
Information Security
Published on
16/4/2025
ISO 27001:2022 - A.5 Organisational Controls (Supplier Management)TRENDING
URM’s blog explains the importance of the 5 supplier management controls in ISO 27001 & provides practical guidance on how to implement each control.
Data Protection
Published on
3/4/2025
Privacy Policies Explained: Ensuring Transparency Under the GDPRTRENDING
URM’s blog explains the GDPR’s requirements for privacy policies, the common mistakes organisations make with these policies & how to avoid them.
Information Security
Published on
27/3/2025
ISO 27001:2022 Annex A Physical ControlsTRENDING
URM’s blog offers key advice on implementing the physical controls in Annex A of ISO 27001 and preparing for a successful physical controls audit.
Data Protection
Published on
20/3/2025
Sharing Personal Data With the PoliceTRENDING
URM’s blog breaks down the key data protection aspects to consider when sharing personal data with the police to ensure GDPR & Data Protection Act compliance.
Information Security
Published on
10/3/2025
PCI SSC Announces Changes to the SAQ ATRENDING
URM’s blog explains the recent update to PCI DSS SAQ-A that has resulted in the removal of 2 new v4 requirements & the addition of new eligibility criteria.
Data Protection
Published on
6/3/2025
Are you Processing Special Category Personal Data Without Knowing It?TRENDING
URM’s blog breaks down the GDPR requirements around special category personal data and how organisations can avoid processing this data inadvertently.
Data Protection
Published on
26/2/2025
Apple Removes Advanced Data Protection Tool from UKTRENDING
URM’s blog explores Apple’s removal of its ADP tool following a dispute with the UK government & the ongoing struggle between privacy and law enforcement.
Information Security
Published on
21/2/2025
The Impact of AI on PCI DSS ComplianceTRENDING
URM’s blog explores how AI can impact PCI DSS compliance, both in terms of the benefits it can provide and the challenges it may present.
Information Security
Published on
14/2/2025
Implementing Technological Controls in ISO 27001TRENDING
URM’s blog offers key guidance on how to effectively implement technological controls in your organisation, the common challenges & how these can be overcome.
Cyber Security
Published on
13/2/2025
Pros and Cons of Different Forms of Technical Security Assessments Including VA DAST AI PT YMMV TRENDING
URM’s blog explains the differences between 4 types of technical security assessments and breaks down the benefits and drawbacks of each.
Data Protection
Published on
5/2/2025
Analysis of Fines Imposed by the Information Commissioner’s Office in 2024TRENDING
URM’s blog breaks down the fines issued by the ICO in 2024 for data protection breaches, highlighting emerging trends in their approach to enforcing compliance.
Data Protection
Published on
28/1/2025
How to Build Customer Trust and Loyalty Through Data Protection Best PracticeTRENDING
URM’s blog offers key advice and guidance on how to ensure your data processing practices facilitate not only regulatory compliance, but also customer trust.
Cyber Security
Published on
24/1/2025
Cyber Essentials: Improving Your Cyber Security as an SMETRENDING
URM’s blog discusses the significant cyber security risks faced by small & medium-sized enterprises (SMEs), and how Cyber Essentials certification can help.
Information Security
Published on
16/1/2025
DORA - The Digital Operations Resilience ActTRENDING
URM’s blog discusses the EU’s Digital Operation’s Resilience Act (DORA), explaining who it will apply to, its requirements, how it will be enforced, and more.
Information Security
Published on
15/1/2025
Information Risk Assessment and Treatment in ISO 27001TRENDING
URM’s blog explains how to conduct information security risk assessments and implement risk treatments that are both efficient and ISO 27001 conformant.
Data Protection
Published on
10/1/2025
STAIRs: A New Standard for Social Housing ProvidersTRENDING
URM’s blog provides a comprehensive breakdown of STAIRs, an upcoming information access standard for private sector social housing providers.
Quality Standards
Published on
13/12/2024
ISO 13485: Medical Devices-Quality Management System ExplainedTRENDING
URM’s blog explains what ISO 13485, which organisations it applies to, its relationship with regulatory frameworks such as the UK and EU MDR, and much more.
Cyber Security
Published on
12/12/2024
Mitigating Cyber Risks: Why Cyber Essentials Matters More Than EverTRENDING
URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.
Data Protection
Published on
6/12/2024
Are You Getting Cookies Compliance Wrong?TRENDING
URM’s blog discusses the GDPR and PECR requirements on cookies, common noncompliant practices & how you can ensure your approach to cookies is compliant.
Data Protection
Published on
22/11/2024
Updated Data Protection Laws Introduced by Chile and IndiaTRENDING
URM’s blog explores the different requirements introduced by these new laws, and the likelihood of a subsequent UK/EU adequacy decision for each nation.
Artificial Intelligence
Published on
22/11/2024
Establishing Organisational Control Over Artificial IntelligenceTRENDING
URM’s blog discusses the need for policy in relation to the use of AI, real-world cases where AI has caused organisations issues & how to create an AI policy.
Cyber Security
Published on
14/11/2024
Cyber Essentials – What’s Changing in 2025? TRENDING
URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.
Information Security
Published on
5/11/2024
Developing an ISO 27001 Information Security PolicyTRENDING
URM’s blog discusses how to develop and implement an information security policy that fully conforms to both your organisation’s and ISO 27001 requirements.
Data Protection
Published on
31/10/2024
DUA Bill: An Initial AssessmentTRENDING
URM’s blog compares the Government’s new Data (Use and Access) Bill with the previous Government’s DPDI Bill, & how it may alter the UK GDPR when it is passed.
Cyber Security
Published on
24/10/2024
Enhancing Security in the Software Supply ChainTRENDING
URM’s blog discusses the security risks associated with the software supply chain & how both software developers and their clients can mitigate these risks.
Internal Audit
Published on
18/10/2024
Internal Auditing of Management SystemsTRENDING
URM’s blog explains how to plan and execute effective and conformant internal audits of management systems at each stage of the internal audit process.
Information Security
Published on
11/10/2024
SOC 2 ExplainedTRENDING
URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.
Information Security
Published on
4/10/2024
Implementing and Auditing ‘People Controls’ from ISO 27001:2022TRENDING
URM’s blog explains why ‘people’ warrants its own control theme in ISO 27001 and how to prepare for a people controls audit, offering advice for each control.
Having been involved in over 450 successful ISO 27001 certifications, URM Consulting Services (URM) is ideally placed to advise you on the essential activities and tasks you will need to carry out in order to maintain and improve your ISO 27001 auditing function and programme.
Find out more
how URM CAN HELP?
URM CONSULTING services
ISO 27002:2022 Update
If you want to learn more about ISO 27002:2022 and how to implement the new controls and the new attributes, you can attend URM’s ISO 27001:2022 Control Migration Course.
Read more
URM CONSULTING services
How robust is your cloud infrastructure security?
URM can deliver cloud pen testing, covering all types of deployments. We can conduct external unauthenticated testing, security configuration reviews, and internal testing if your cloud infrastructure is integrated into on-premise infrastructure.
Read more
URM CONSULTING services
Do you need support in meeting your annual PCI DSS penetration testing requirements?
As a CREST-accredited penetration testing organisation, URM can complete internal and external penetration tests.
Read more
"
Our URM consultant was really thorough, genuinely helpful and contributed real value literally within the first few minutes of our session by pointing out some (not-so-obvious) details of the new version of ISO 27001 that we hadn't been aware of until then. He then proceeded with a very well-prepared run-through and explanation of the controls in scope for our upcoming internal audit. Definitely a highlight and overall, very positive experience for us!
contact US
Let us help you
Let us help you in your compliance journey by completing the form and letting us know how we can best support you.
