Cyber Security Free Resources

 

Cyber Health Check

Download this case study to see how a market research firm achieved a higher level of confidence in its security posture with IT Governance’s Cyber Health Check.

Download now

SOC 2 Audit Readiness Assessment

This case study outlines how IT Governance conducted a readiness assessment and developed a roadmap of recommendations to help this firm achieve compliance with the requirements of the SOC 2 TSP.

Download now

 

Assured Security – Getting cyber secure with penetration testing

Assured Security – Getting cyber secure with penetration testing

Download this paper to find out how to keep your organisation’s information and systems secure with effective penetration testing.

Download now

Cloud Security – Who is responsible?

Cloud Security – Who is responsible?

Download this paper to learn about the security challenges of using the Cloud, how the Cloud provider–customer relationship works and where your respective responsibilities lie, relevant legal and contractual requirements, and a practical approach to meeting your obligations.

Download now

Cyber Essentials – A guide to the scheme

Cyber Essentials – A guide to the scheme

Download this paper, updated for v3.1/Montpellier, to discover what Cyber Essentials is, the benefits of certification, how to meet the scheme’s requirements and how certification works for both tiers of the scheme.

Download now

Cyber Incident Response Management – A beginner’s guide

Cyber Incident Response Management – A beginner’s guide

Download this paper to learn how to effectively prepare for cyber incidents so you can mitigate their impact and protect your organisation.

Download now

Cyber Security and ISO 27001 – Addressing the cyber threat landscape

Cyber Security 101 – A guide for SMEs

Looking for an introduction to cyber security? Download ‘Cyber Security 101 – A guide for SMEs’ to find out how to get started with the basics of cyber security while keeping costs at a minimum.

Download now

 

Free PDF download: Cyber Security and Business Resilience – Thinking strategically

Cyber Security and Business Resilience – Thinking strategically

Suffering a cyber attack is a matter of when, not if. Organisations need to combine cyber security with business resilience to be able to recover effectively.? Download this paper to understand what elements to take into account as you plan your defences, the value of thinking resiliently, risk assessment basics, and more.

Download now

Cyber Security and ISO 27001 – Reducing your cyber risk

Cyber Security and ISO 27001 – Reducing your cyber risk

Download this green paper now to learn how smart organisations are protecting their reputations and critical information assets while winning new business with ISO 27001 certification. 

Download now

Mobile Device Security – Adapting to flexible working

Mobile Device Security – Adapting to flexible working

Mobile devices enable us to work on the go or from home with ease, but come with a host of challenging security risks. Download this paper to discover some of the most common risks and a range of measures to help mitigate them.

Download now

Ransomware – Threats and mitigation

Ransomware – Threats and mitigation

Ransomware is one of the biggest threats to organisations today. In minutes, it can spread through a network and cripple even well-prepared organisations. Read this paper to discover the varieties of ransomware and how they work, what you can do to prevent a ransomware attack, and more.

Download now

Free PDF download: Cyber Security for the Board – A permanent priority

Cyber Security for the Board – A permanent priority

Government research shows that UK boards are deprioritising cyber security. However, this is a false economy: if you do not keep up with the latest threats and vulnerabilities, attackers will find and exploit them. Fortunately, taking basic precautions that can significantly lower your risk need not be expensive.

Download now

 

Data breach and cyber attack reports

Data breach and cyber attack reports

Download our monthly Data Breach Dashboards to get a one-page overview of our analysis of publicly disclosed incidents.

Download now

 

A guide to cyber security for IT support teams

A guide to cyber security for IT support teams

In this guide, we take a closer look at the challenges that IT support teams face and the steps they can take to protect their organisations.

Download now

A guide to cyber security for the financial services sector

A guide to cyber security for the financial services sector

In this guide, we take a closer look at the ways the financial services sector is being targeted and what you can do to protect your organisation.

Download now

Cyber Health Check – Uncover your cyber security weak spots before attackers do

Cyber Health Check – Uncover your cyber security weak spots before attackers do

IT Governance can help you identify your weakest security areas and take appropriate action by following our practical recommendations in this brochure.

Download now

12 Cyber Security Questions to Ask Your CISO

Cyber Security Risk Scorecard

Download our free Cyber Security Risk Scorecard and answer 21 key questions to get an indication of your organisation’s overall level of cyber security risk.

Download now

Hybrid Working - Managing cyber security and data privacy risks

Hybrid Working – Managing cyber security and data privacy risks

Whether your staff work in the office, at home, in shared working spaces or anywhere else, you face numerous additional risks to the confidentiality, integrity and availability of your corporate information. This brochure explains what those risks are and how IT Governance can help you manage them

Download now

Staff Awareness E-learning catalogue

Staff Awareness E-learning catalogue

Explore our full range of off-the-shelf staff awareness e-learning courses, including multi-course suites. All courses and games can be accessed in SaaS or SCORM formats for hosting on your LMS or ours. We can customise content, translate courses or create bespoke courses upon request.

Download now

 

Cyber Security Statistics You Need to Know

Cyber Security Statistics You Need to Know

Many SMEs believe that only large organisations are targeted by cyber criminals. Our free infographic demonstrates this risk, as it highlights 14 cyber security statistics for SMEs.Cyber attacks and data breaches are a real risk for all organisations, no matter their size. Our free infographic highlights some of the top cyber security statistics you should be aware of.

Download now

 List of data breaches in 2021

List of data breaches in 2021

With the Covid-19 pandemic and a sudden shift to remote working, many organisations became open to vulnerabilities, which cyber criminals were quick to capitalise on.

Download now

Top 5 remote working cyber security tips

Top 5 remote working cyber security tips

Hastily deployed remote working arrangements have introduced critical risks during the COVID-19 lockdown. We’ve compiled a list of the top 5 remote working cyber security risks you should be aware of.

Download now

title

Working from home top tips

We’ve rounded up a selection of useful tips from IT Governance employees and our security experts on how you can get used to working from home, and keep cyber secure. 

Download now

What are the major types of cyber attack?

What are the major types of cyber attack?

With cyber threats constantly evolving, cyber security can be a complex undertaking. Download our free infographic to learn more about the major types of cyber attacks. 

Download now

What is ransomware and how can I protect my business?

What is ransomware and how can I protect my business?

Ransomware is a type of malicious programme that demands payment after launching a cyber attack on a computer system. For a quick guide to ransomware and what you can do to protect your business, download our free infographic.

Download now

Cyber Security: The must haves

Cyber Security: The must haves

Knowing where to start with your organisation’s cyber security can be daunting and confusing. For a quick guide to cyber security and what you can do to protect your business, download our free infographic.

Download now

Minimise the risk of phishing attacks by assessing and educating end users

Minimise the risk of phishing attacks by assessing and educating end users

Phishing is a type of social engineering attack in which cyber criminals trick victims into handing over sensitive information or installing malware. Download our free infographic for more information on phishing, types of phishing attacks and more.

Download now

The Rise of Hybrid Working

The Rise of Hybrid Working

As many organisations make the permanent shift towards hybrid working, we take a look at the statistics behind remote working before, during and post-pandemic, along with the benefits and challenges of working from home.

Download now

How to Keep your Hybrid Workforce Secure – In Six Steps

How to Keep your Hybrid Workforce Secure – In Six Steps

Do you know how to keep your staff secure in and out of the office? We outline the six steps that you can take to keep your hybrid workforce protected.

Download now

Free infographic: CrowdStrike: What Went Wrong?

CrowdStrike: What Went Wrong?

Discover the full story behind the July 2024 CrowdStrike outage, one of the biggest security incidents of the year, with our detailed infographic.

Download now

 

On-demand cyber security webinars

How to meet SEC rules with ISO 27001

Hosted by:

  • Alan Calder, Founder and Executive Chairman, IT Governance

Join our live webinar on how ISO 27001 can help you meet SEC cybersecurity disclosure rules

In today’s dynamic business environment, cybersecurity compliance is paramount, and the U.S. SEC (Securities and Exchange Commission) has taken proactive steps to ensure the protection of sensitive information and the resilience of financial markets.

IT Governance's cybersecurity expert Alan Calder, will provide guidance on how ISO 27001 can help you comply withthe intricate SEC cybersecurity disclosure rules. You will get a comprehensive understanding of the specific requirements outlined by the SEC and the rationale behind these regulations.

Read more

How do you comply with the SEC Cyber security rules?

Hosted by:

  • Alan Calder - Founder and Executive Chairman, IT Governance

In today’s rapidly evolving cyber threat landscape, cyber security has become a cornerstone of business resilience.

Cyber security expert William Gamble, from IT Governance USA, will delve into the specifics to explain the rationale behind these regulations and how they impact your organization.

Read more

An Introduction to the SEC Cyber Security Disclosure Rules

Hosted by:

  • William Gamble, Cyber Security Consultant, IT Governance USA

In today’s threat landscape, the protection of sensitive data and the transparency of cyber security practices are paramount. To address these vital concerns, the US SEC (Securities and Exchange Commission) has introduced a set of robust cyber security disclosure rules.

These rules are designed to ensure that publicly listed organisations not only safeguard their digital assets but also communicate their cyber security risk management efforts transparently.

Cyber security expert William Gamble, from IT Governance USA, will demystify the complexities of these SEC rules, explaining why they exist and how they impact your organisation.

Read more

Building Your Career as a Cyber Security Manager

Hosted by:

  • Jeremy Green, Cyber Security Specialist and Instructor, IT Governance
  • Andrew Johnston, Head of Training, IT Governance

Are you eager to embark on a journey into the dynamic world of cyber security? Our expert will guide you through this exciting field.

If you’ve ever considered a career in this exciting field, our webinar is your gateway to understanding what it takes to get started.

Read more

Building Your Career as a Cyber Engineer and Ethical Hacker

Hosted by:

  • Jeremy Green, Cyber Security Specialist and Instructor, IT Governance
  • Andrew Johnston, Head of Training, IT Governance

Are you ready to take the first step towards a career in the dynamic world of cyber security? Learn from a cyber security expert and get invaluable guidance.

If you’ve ever contemplated a career in this exciting field, our webinar is your gateway to understanding what it takes and how to get started.

Read more

Cyber Incident Response Tabletop Exercises

Hosted by:

  • Cliff Martin, Head of Cyber Incident Response, GRCI Law
  • Vanessa Horton, Cyber Incident Responder, GRCI Law

Tabletop exercises are vital for implementing a robust CIR (cyber incident response) plan within your organisation. These simulations train your team to respond to real cyber incidents swiftly and effectively by identifying vulnerabilities and weaknesses in your defences.

They foster collaboration among departments, ensuring everyone is prepared and aligned in their roles. By refining response strategies and addressing gaps, tabletop exercises boost your organisation’s resilience against cyber attacks.

Read more

Maximising your Cyber Incident Response Capabilities – Strategies for Success

Hosted by:

  • Alan Calder, Founder and Executive Chairman, IT Governance
  • Cliff Martin, Head of Incident Response, GRCI Law

Incident response is a critical component of an organisation’s cyber security strategy. With the increasing frequency and complexity of cyber threats, it’s more important than ever to have a robust and effective incident response plan in place. However, building an incident response programme that delivers results is not a simple task. It requires a deep understanding of the latest threats and trends, effective planning, and the ability to execute quickly and efficiently.

In this webinar, we will explore the strategies and best practices for building an effective incident response programme. Our cyber incident response experts will provide insights into the key components of an effective incident response system, tips for maximising your incident response capabilities and practical advice for overcoming common challenges.

Read more

On-demand cyber security webinars

Panel discussion: How to navigate penetration testing – Insights from security testers

Hosted by:

  • Adam Seamons, Information Security Manager, GRC International Group

Panellists:

  • James Pickard, Head of Security Testing, IT Governance
  • Joshua Holding, Senior Pentration Tester, IT Governance
  • Ross Higgins, Penetration Tester, IT Governance

In the face of ever-increasing threats to our security, conducting regular penetration testing has become essential to ensure systems and data are secure. With so many critical systems and assets to consider, and the increasing number of threats, it can be difficult to know where to start.

To help you address this challenge, IT Governance’s panel of industry experts will provide valuable insight and guidance. They will share their experiences and knowledge, providing actionable recommendations to help you improve your organisation’s security posture.

Read more

Navigating the 2023 Cyber Threat Landscape – A Briefing for Business Leaders

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

alan headshot image

As cyber threats continue to evolve and become more sophisticated, it's crucial for business leaders to stay ahead of the curve and protect their organisations.

This 20-minute webinar will provides a high-level overview of the most important considerations for business leaders, CEOs and senior management when it comes to their organisation’s privacy and cyber security.

Alan Calder, Founder and Executive Chairman of IT Governance, will take you through the key cyber security and privacy that boards and senior leaders should be aware of.

Read more

Cyber Essentials - The 5 key steps to certification

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

Cyber Essentials is one of the most popular UK cyber security certification schemes. This government-backed scheme outlines five controls that can prevent about 80% of the most common cyber attacks. These controls can be implemented by anyone who is familiar with the scheme, regardless of their level of information security knowledge.

Read more

Panel discussion: Cyber security and privacy predictions for 2023

group of hosts profile pictures

Delivered by:

  • Alan Calder, Founder and Executive Chairman, IT Governance
  • Cliff Martin, Head of Cyber Incident Response. GRCI Law
  • John Potts, Operations Director, GRCI Law

Hosted by:

  • Adam Seamons, Information Security Manager, GRC International Group

While it is difficult to make precise predictions about the state of cyber security and privacy in 2023, there are a few trends that are likely to continue or accelerate in the coming years. As technology becomes more advanced, one trend that is likely to continue is the increasing sophistication of cyber attacks. This means that organisations need to be more diligent than ever by investing in people and processes to protect their systems and data.

Join us on this live panel discussion where our cyber security, privacy and incident response experts will take you through the key lessons learnt from last year’s cyber attacks and data breaches, and discuss what we can expect in 2023.

Read more

Stage 5 – Recovery: The final layer of your cyber defence-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

Recovering from a cyber attack or data breach can be more disruptive than an organisation has planned for.

Most of the time, an organisation can restore enough critical services to be able to continue functioning, but it can take months to fully return to business as usual. Having cyber insurance in place can give organisations peace of mind, providing cover when they need it most and helping them get back to business as usual as soon as possible.

Read more

Stage 4 – Response: The fourth layer of your cyber-defence-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance and CEO of GRC International Group

Implementing a cyber security incident response management plan means you won’t waste valuable time when the worst happens.

Cyber incident response is a part of wider business continuity management. It helps you put plans in place to cover all types of unplanned disruption, from cyber security incidents to natural disasters, from power outages to pandemics.

This is especially important when it comes to breaches of personal data, which may need to be reported to the data protection authorities within 72 hours of being discovered under the DPA (Data Protection Act) 2018 and GDPR (General Data Protection Regulation).

Read more

Stage 3 – Management: The third layer of your cyber-defence-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance and CEO of GRC International Group

When it comes to larger or more complex organisations, managing cyber security risks requires a more intensive approach than implementing basic security protection.

Embedding risk-based security controls, managing the security of supply chains and carrying out regular audits are some of the many measures an organisation may need to take to manage and reduce risk.

Read more

Stage 2 – Protection: The second layer of your cyber defence-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

Protecting an organisation from the increasing threat of cyber attacks can be challenging. Employees are a crucial line of defence, and ensuring they know their security responsibilities and how to spot a cyber attack is critical.

Depending on the organisation, it may not need to implement extensive security measures, but at least a base level of security is essential. Certification to security schemes can protect an organisation from the most common cyber threats and publicly demonstrate its commitment to cyber security.

Read more

Stage 1 – Detection: The first layer of your cyber defence-in-depth strategy

Delivered by: Alan Calder, founder and executive chairman, IT Governance and CEO of GRC International Group

Understanding the threats you face and where your cyber defences are most at risk of being breached is critical to securing your organisation against cyber attacks.

By implementing detection measures your can identify security flaws, enabling you to bolster defences where needed.

Read more

Flash briefing: The growing importance of implementing a cyber-defence-in-depth strategy

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance 

With new vulnerabilities being identified constantly, understanding your organisation’s security weaknesses is paramount. The current political climate also means that organisations have been urged to bolster their cyber security defences and tactics as the Russian invasion of Ukraine continues.

Get peace of mind that your organisation is safe and secure with a cyber-defence-in-depth strategy. This should involve regularly testing your firewalls and external-facing services and training your staff to identify and respond to phishing attacks.

Read more

CyberComply – Future-proof your compliance investment

Delivered by:

  • Gary Baxter – Customer Success Manager, Vigilant Software
  • Tom Reading – Business Development Manager, Vigilant Software
  • Alan Calder – Founder and Executive Chairman, IT Governance

Most organisations need help complying with various legal requirements such as the GDPR (General Data Protection Regulation), NIS Directive, or the PCI DSS, with many organisations unable to bring in expert consultants to deliver the work.

To reduce compliance costs, organisations can benefit from software designed to help your team understand your compliance requirements, from risk assessments to data breach reporting.

This webinar provides insight into the challenges organisations face within the current threat landscape.

Read more

Webinar: 20 years in cyber security

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

IT Governance is celebrating 20 years in business. 20 years in which organisations’ approaches to cyber security have continually evolved – and with ever-evolving risks lurking in cyberspace, it is imperative that businesses and individuals are vigilant and aware of the threats.

In this digital era, data has become a treasure trove for cyber criminals. Even obscure information has a distinct value, which criminals can steal, damage or misuse.

Read more

Webinar: New cyber incident reporting obligations that you need to be aware of in the EU and US

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

On 1 March, the US Senate passed the Strengthening American Cyber security Act of 2022, which requires organisations to report any personal data breaches within 72 hours of the incident taking place. This aligns with the requirements of the GDPR.

In addition, the proposed EU corporate accountability rules require directors to take on new data protection responsibilities.

Read more

On-demand cyber security webinars

Flash briefing: Cyber warfare and the threat of escalating cyber aggression

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

As Russia continues to focus on the battle for Ukraine by disrupting and destroying Ukrainian computers and networks, NATO states are taking the threat of Russian cyber aggression very seriously and have issued a number of warnings for organisations to tighten their security.

Read more

Webinar: Data breaches – before and after they occur

Delivered by:

  • Cliff Martin, Cyber Incident Responder, GRCI Law
  • John Potts, Operations Director, GRCI Law

As we recover from the pandemic, hybrid working has proven hugely popular with individuals and organisations. However, IBM’s Cost of a Data Breach Report 2021 found that the average cost of data breaches at organisations with more than 80% of employees working remotely was $5.54 million (about £4.1 million) – $1.3 million (about £0.96 million) more than the overall average of $4.24 million (about £3.13 million).

Read more

Flash briefing: The cyber security implications of Russia invading Ukraine

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance and CEO of GRC International Group

The tensions between Russia and Ukraine have led to reports warning UK organisations to improve their cyber security defences, as fears grow that cyber attacks linked to the conflict could move beyond Ukraine’s borders.

Read more

Panel discussion: How to prevent and respond to the most successful vulnerabilities exploited by attackers

Panellists:

  • Adam Seamons, Systems & Security Engineer, GRC International Group
  • James Pickard, Security Testing Manager, IT Governance
  • Cliff Martin, Cyber Incident Responder, GRCI Law

Existing and emerging vulnerabilities exploited by cyber criminals hit the headlines daily. With cyber criminals using a combination of web-based exploit kits and planned and targeted sophisticated attacks, organisations are under more pressure than ever to put in place controls and measures to identify threats and reduce their impact.

Read more

Panel discussion: Last year’s privacy and cyber security lessons and how to prepare for an unpredictable 2022

Panellists:

  • Alan Calder, Founder and CEO of IT Governance
  • John Potts, Operations Director, GRCI Law
  • Cliff Martin, Incident Responder, GRCI Law

The challenges of the COVID-19 pandemic, the large-scale shift to remote working and emerging cyber security threats created some of the most demanding operating conditions for organisations ever seen.

With 2021 behind us, it is important to reflect on how cyber security and privacy incidents affected organisations worldwide and the lessons they can learn to operate safely in an unpredictable 2022.

Read more

Flash briefing: How to avoid data breaches caused by human error

Delivered by: Alan Calder, Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breaches Investigations Report, 85% of data breaches involved a human element. It’s clear that many organisations are struggling to handle the threat that their own staff present.

With staff moving to remote or hybrid working during the pandemic, the challenge of containing human error is greater than ever. Data breaches can be caused by something as simple as accidentally emailing an internal document to a client.

Read more

Webinar: The hidden consequences of email security in the ‘new normal’

Delivered by:

  • Alan Calder, Founder and Executive Chairman, IT Governance
  • Paul Holland, CEO, Beyond Encryption

IT Governance joins forces with Beyond Encryption to provide insight into how you can improve your email security practices and reduce the number of data breaches resulting from human error.

Read more

Flash briefing: 20 minutes on how to prevent phishing attacks

Delivered by: Alan Calder, Founder and Executive Chairman of IT Governance

According to Verizon’s 2021 Data Breach Investigations Report, 43% of data breaches in the past year occurred due to phishing attacks and/or pretexting.

IBM’s 2021 research into the cost of a data breach ranks phishing attacks as the second most expensive cause of data breaches, costing businesses an average of $4.65 million.

Read more

FLASH BRIEFING: How to Navigate and Implement a Successful Hybrid Workforce

Delivered by: Alan Calder, Founder and Executive Chairman, IT Governance

A hybrid working model gives staff the choice to work in an office, at home or in shared working spaces.

With 90% of organisations intending to shift to hybrid working where possible after the COVID-19 pandemic, remote workers will be even more susceptible to cyber threats, in some cases creating huge cyber security and privacy compliance challenges.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Security Testing

Cyber crime has thrived during the pandemic, with the move to remote working offering new opportunities for attackers to exploit human vulnerabilities and digital systems. Last year, 85% of breaches involved a human element, and attacks on web applications represented 39% of all breaches.

It is therefore more important than ever for organisations to understand how secure their network is against external threats and cyber attacks.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Cyber Incident Response

Delivered by: Cliff Martin, Cyber Incident Responder

Watch this 20-minute flash briefing, during which our cyber expert, Cliff Martin will dissect one of the major cyber attacks that have hit the headlines this month. He will offer a high-level overview and practical advice on how these attacks could have been mitigated – and what your organisation needs to do to avoid suffering the same fate.

Read more

FLASH BRIEFING: Navigate to Cyber Safety – Ransomware

Presenters:

  • Alan Calder, Founder and Executive Chairman
  • James Pickard, Security Testing Manager
  • Cliff Martin, Cyber Incident Responder

61% of organisations have been hit by a ransomware attack over the past 12 months (Mimecast 2021).

Join this 20-minute flash briefing, during which our team of cyber experts will dissect two of the major ransomware attacks that have hit the headlines this month. They offer a high-level overview and practical advice on how these attacks could have been mitigated – and what your organisation needs to do to avoid suffering the same fate. Our experts examine:

Read more

Cyber incident response readiness for SMEs

Presenters: Geraint Williams, CISO, GRC International Group

According to IBM’s Cost of a Data Breach Report 2020, it takes an average of 280 days to identify and contain a breach. The average total cost of a breach now stands at $3.86 million (about £2.74 million), but the report suggests that organisations that have implemented a cyber incident response plan to identify and contain the impact of a cyber incident within 200 days can reduce their financial damage by $1.12 million (about £794,000).

Read more

7 cyber security risks and how to overcome them

Presenters:

  • Geraint Williams, CISO, GRC International Group
  • Adriaan Bekker, Technical Director, Softwerx Ltd

In a recent data analysis of 20 UK regions, the ONS (Office for National Statistics) revealed that Cambridgeshire suffered the sharpest increase in cyber crime between 2016 and 2018, with the number of cases escalating by 49% (from 2,789 to 4,155).

The COVID-19 pandemic has exacerbated the problem, with cyber crime levels rising exponentially during lockdown as criminals targeted remote workers with phishing, scams and malware.

Read more

Cyber security and the human threat: what SMEs can do

Presenters:

  • Geraint Williams, CISO, GRC International Group
  • Stefanie Retfalvi, Principal Consultant, Learning Design, IT Governance

At the start of the COVID-19 pandemic, as more staff transitioned to remote working, cyber security experts cautioned organisations about their reduced ability to detect and contain cyber incidents, advising them to implement further security measures. IBM’s Cost of a Data Breach Report 2020 backs their claims, suggesting that where employees work from home, the cost of a data breach increases by $137,000 (about £97,000).

Addressing the human element of cyber security is key to an organisation’s survival. The NCSC (National Cyber Security Centre) says that more than 60% of small and medium-sized organisations globally that suffer a major cyber attack close their doors within 12 months. It’s therefore vital that organisations – and their staff – know how to recognise and respond to an incident.

Read more

Cyber threats and the risks they pose to SMEs

Presenter: Geraint Williams, CISO, GRC International Group

With 60% of small and medium-sized organisations globally closing their doors within 12 months of suffering a major cyber attack, cyber security awareness is vital to their survival.

Addressing complex security issues can be challenging for SMEs. It is essential to ensure your organisation does not waste time and resources, while reducing the likelihood of underestimating or overlooking risks that could cause significant damage.

Read more

Online panel discussion – COVID-19 – Risks and opportunities post-lockdown

Online panel discussion – COVID-19 – Risks and opportunities post-lockdown

With restrictions to contain the COVID-19 pandemic easing and the world coming out of lockdown, many organisations are now preparing for a phased return to work.

As the lockdown comes to an end, organisations will inevitably face increased pressure to take the necessary measures to handle privacy and cyber risks – and to avoid fines for non-compliance – as they re-establish operations.

Read more

Online panel discussion – COVID-19 Cyber Risk and Data Privacy Response

Online panel discussion – COVID-19 Cyber Risk and Data Privacy Response

The sudden global shift to remote working has brought unprecedented changes to social and work habits, and introduced new cyber risks and data privacy challenges that affect the way organisations need to operate.

As most employees are working from home, they may be accessing and processing information outside the organisation’s normal security perimeter, which increases the risk of a data breach. With cyber criminals employing sophisticated phishing tactics and malicious websites to target staff by impersonating credible information sources around COVID-19, organisations need to implement security measures to address these challenges.

Read more

Managing cyber security and privacy risks with inadequate resources

Managing cyber security and privacy risks with inadequate resources

 

The multi-faceted aspects of cyber security risks and data privacy regulations have led to an increased demand for scarce cyber security skills.

With the cyber security skills gap continuing to increase, many organisations are struggling to find the expertise they need to address their cyber security challenges.

Read more

Surviving tomorrow’s cyber-attacks: resilience and cost-reduction

Surviving tomorrow’s cyber-attacks: resilience and cost-reduction

Initiating a cyber resilience strategy requires identifying the high-value assets within your organisation and their associated risks to strategically target areas for improvement. This webinar will help you understand how to start building cyber resilience.

Read more

Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotland and the rest of the UK

Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotland and the rest of the UK

Cyber attacks are increasing in frequency and severity to such an extent that it’s no longer enough to trust that you can defend against every potential attack. Statistics suggest that it is inevitable that your organisation will suffer a data breach.

Read more

Cyber incident response management webinars on demand

Cyber incident response management: an essential tool for the GDPR and NIS Directive

Cyber incident response management: an essential tool for the GDPR and NIS Directive

 

The first webinar in the series explains general incident response concepts. It focuses on the importance of incident response within the General Data Protection Regulation (GDPR) and Directive on security of network and information systems (NIS Directive (now transposed in UK law as the NIS Regulations 2018)) frameworks and delivers an overview of the CIRM process.

Read more

Cyber incident response management: what you need to know

Cyber incident response management: what you need to know

The second webinar focuses on the incident response process itself. It explains the terminology used and presents and describes different types of cyber attacks to give a clearer understanding of how vulnerabilities are exploited and what strategies are used to minimise risk.

Read more

Cyber incident response management: planning and implementation

The third and final webinar deals with incident response planning consideration and implementation, and the reporting requirements of the incident response system.

Planning is based on an organisation’s infrastructure topology and risk exposure, and implementation entails the development of an incident response team and test scenarios.

Report generation is the end product of the incident response process. It provides the audit trail details of an incident and is a requirement of all major regulatory frameworks and compliance standards.

Read more

 

Free e-book: The Basics – Security Edition

Free e-book: The Basics – Security Edition

This free e-book is a collection of our most popular content covering cyber security, information security, data protection and staff awareness.

It provides a comprehensive introduction to the security threats you face and the ways you can protect yourself.

You will discover the most common types of cyber attack, the risks of working from home, the data protection policies and processes you must implement, the way scammers target your employees, and much more

Download now

LEARN
FOR LESS
SAVE 25%