Blog
Recent blogs

ICO’s Appeal in Clearview AI Case Upheld
Published on
14
November
2025
TRENDING
URM’s blog examines the impact of the latest ruling from the Upper Tribunal in the Clearview AI case, and the cross-border GDPR enforcement gap it exposes.
Read more
Information Security
Published on
27/3/2025
ISO 27001:2022 Annex A Physical ControlsTRENDING
URM’s blog offers key advice on implementing the physical controls in Annex A of ISO 27001 and preparing for a successful physical controls audit.
Data Protection
Published on
20/3/2025
Sharing Personal Data With the PoliceTRENDING
URM’s blog breaks down the key data protection aspects to consider when sharing personal data with the police to ensure GDPR & Data Protection Act compliance.
Information Security
Published on
10/3/2025
PCI SSC Announces Changes to the SAQ ATRENDING
URM’s blog explains the recent update to PCI DSS SAQ-A that has resulted in the removal of 2 new v4 requirements & the addition of new eligibility criteria.
Data Protection
Published on
6/3/2025
Are you Processing Special Category Personal Data Without Knowing It?TRENDING
URM’s blog breaks down the GDPR requirements around special category personal data and how organisations can avoid processing this data inadvertently.
Data Protection
Published on
26/2/2025
Apple Removes Advanced Data Protection Tool from UKTRENDING
URM’s blog explores Apple’s removal of its ADP tool following a dispute with the UK government & the ongoing struggle between privacy and law enforcement.
Information Security
Published on
21/2/2025
The Impact of AI on PCI DSS ComplianceTRENDING
URM’s blog explores how AI can impact PCI DSS compliance, both in terms of the benefits it can provide and the challenges it may present.
Information Security
Published on
14/2/2025
Implementing Technological Controls in ISO 27001TRENDING
URM’s blog offers key guidance on how to effectively implement technological controls in your organisation, the common challenges & how these can be overcome.
Cyber Security
Published on
13/2/2025
Pros and Cons of Different Forms of Technical Security Assessments Including VA DAST AI PT YMMV TRENDING
URM’s blog explains the differences between 4 types of technical security assessments and breaks down the benefits and drawbacks of each.
Data Protection
Published on
5/2/2025
Analysis of Fines Imposed by the Information Commissioner’s Office in 2024TRENDING
URM’s blog breaks down the fines issued by the ICO in 2024 for data protection breaches, highlighting emerging trends in their approach to enforcing compliance.
Data Protection
Published on
28/1/2025
How to Build Customer Trust and Loyalty Through Data Protection Best PracticeTRENDING
URM’s blog offers key advice and guidance on how to ensure your data processing practices facilitate not only regulatory compliance, but also customer trust.
Cyber Security
Published on
24/1/2025
Cyber Essentials: Improving Your Cyber Security as an SMETRENDING
URM’s blog discusses the significant cyber security risks faced by small & medium-sized enterprises (SMEs), and how Cyber Essentials certification can help.
Information Security
Published on
16/1/2025
DORA - The Digital Operations Resilience ActTRENDING
URM’s blog discusses the EU’s Digital Operation’s Resilience Act (DORA), explaining who it will apply to, its requirements, how it will be enforced, and more.
Information Security
Published on
15/1/2025
Information Risk Assessment and Treatment in ISO 27001TRENDING
URM’s blog explains how to conduct information security risk assessments and implement risk treatments that are both efficient and ISO 27001 conformant.
Data Protection
Published on
10/1/2025
STAIRs: A New Standard for Social Housing ProvidersTRENDING
URM’s blog provides a comprehensive breakdown of STAIRs, an upcoming information access standard for private sector social housing providers.
Quality Standards
Published on
13/12/2024
ISO 13485: Medical Devices-Quality Management System ExplainedTRENDING
URM’s blog explains what ISO 13485, which organisations it applies to, its relationship with regulatory frameworks such as the UK and EU MDR, and much more.
Cyber Security
Published on
12/12/2024
Mitigating Cyber Risks: Why Cyber Essentials Matters More Than EverTRENDING
URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.
Data Protection
Published on
6/12/2024
Are You Getting Cookies Compliance Wrong?TRENDING
URM’s blog discusses the GDPR and PECR requirements on cookies, common noncompliant practices & how you can ensure your approach to cookies is compliant.
Data Protection
Published on
22/11/2024
Updated Data Protection Laws Introduced by Chile and IndiaTRENDING
URM’s blog explores the different requirements introduced by these new laws, and the likelihood of a subsequent UK/EU adequacy decision for each nation.
Artificial Intelligence
Published on
22/11/2024
Establishing Organisational Control Over Artificial IntelligenceTRENDING
URM’s blog discusses the need for policy in relation to the use of AI, real-world cases where AI has caused organisations issues & how to create an AI policy.
Cyber Security
Published on
14/11/2024
Cyber Essentials – What’s Changing in 2025? TRENDING
URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.
Information Security
Published on
5/11/2024
Developing an ISO 27001 Information Security PolicyTRENDING
URM’s blog discusses how to develop and implement an information security policy that fully conforms to both your organisation’s and ISO 27001 requirements.
Data Protection
Published on
31/10/2024
DUA Bill: An Initial AssessmentTRENDING
URM’s blog compares the Government’s new Data (Use and Access) Bill with the previous Government’s DPDI Bill, & how it may alter the UK GDPR when it is passed.
Cyber Security
Published on
24/10/2024
Enhancing Security in the Software Supply ChainTRENDING
URM’s blog discusses the security risks associated with the software supply chain & how both software developers and their clients can mitigate these risks.
Internal Audit
Published on
18/10/2024
Internal Auditing of Management SystemsTRENDING
URM’s blog explains how to plan and execute effective and conformant internal audits of management systems at each stage of the internal audit process.
Information Security
Published on
11/10/2024
SOC 2 ExplainedTRENDING
URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.
Information Security
Published on
4/10/2024
Implementing and Auditing ‘People Controls’ from ISO 27001:2022TRENDING
URM’s blog explains why ‘people’ warrants its own control theme in ISO 27001 and how to prepare for a people controls audit, offering advice for each control.
Data Protection
Published on
27/9/2024
Data Protection Considerations for Monitoring EmployeesTRENDING
URM’s blog offers key advice and detailed guidance on how to balance your organisation’s needs with GDPR compliance as you perform workplace monitoring.
Information Security
Published on
20/9/2024
ISO 27002, the Unsung HeroTRENDING
URM’s blog explains what ISO 27002 is, how it can benefit your organisation, & how you can use it to support your implementation of an ISO 27001-conformant ISMS
Data Protection
Published on
13/9/2024
How to Conduct a Legitimate Interest Assessment (LIA)TRENDING
URM’s blog discusses the importance of LIAs for maintaining compliance with the GDPR, as well as providing a step-by-step breakdown of how to conduct one.
Information Security
Published on
5/9/2024
Common Questions When Managing Supplier Information Security Risks TRENDING
URM’s blog answers key questions on supplier risk management, with a particular focus on the aspects to consider once a supplier has been selected.
Having been involved in over 450 successful ISO 27001 certifications, URM Consulting Services (URM) is ideally placed to advise you on the essential activities and tasks you will need to carry out in order to maintain and improve your ISO 27001 auditing function and programme.
Find out more
how URM CAN HELP?
URM CONSULTING services
Get ISO 22301-ready with expert BIA support, BC plans, and implementation consultancy
We’ll help you develop and test robust BC plans, conduct BIAs with our Abriska® 22301 tool, and close any gaps. Partner with URM to meet ISO 22301 standards and protect your operations from disruption.
Read more
URM CONSULTING services
Does your mobile application need to be pen tested?
URM can conduct penetration tests on mobile apps that are deployed to either Apple IOS or Android devices, typically against the OWASP MASVS, but also under the CREST OVS framework where required.
Read more
"
The guidance and support we’ve received from URM during the process for both certifications have been exceptional, putting us at ease and providing clear and concise explanations and advice to ensure we met all the necessary requirements. We would not hesitate to recommend them.
contact US
Let us help you
Let us help you in your compliance journey by completing the form and letting us know how we can best support you.
