top of page
FORMS & PROCEDURES:
Blog
Search
Jodie Read
Nov 1, 20222 min read
Information Assets for ISO 27001
If you're in the process of implementing an information management system to meet the requirements of ISO 27001 then one of your major...
0 comments
Maria Williams
May 3, 20222 min read
What can 2001: A Space Odyssey teach us about business continuity?
Dr Bowman usually wakes at 7am, exercises for 45 minutes to maintain his muscle tone in space, showers, has breakfast with the rest of...
0 comments
Jodie Read
Mar 18, 20222 min read
#FindingsFriday: ISO 27001:2013 - Annex A.15 Supplier Relationships
The Finding It may be beneficial to encourage [the shredding company] to gain a UKAS accredited ISO 27001 certificate, to further...
0 comments
Jodie Read
Feb 11, 20222 min read
#FindingsFriday: ISO 27001:2013 - Annex A.6.2.1 Mobile Device Policy
The Finding Laptops are encrypted. Policy ISP 11 should define encryption levels. Some Context to the Finding It is normal to use...
0 comments
Maria Williams
Dec 22, 20212 min read
Don’t let your business Die Hard if something happens to your offices
The building manager stood in front of Nakatomi Plaza with his mouth open. “It looks like a battlefield,” he said. A car had smashed...
0 comments
Jodie Read
Dec 1, 20211 min read
Five gold stars for Space2B at The Maltings
As it's 1st December, you've kind of got to sing "five gold stars" as though you were singing the line "five gold rings" in the Christmas...
0 comments
Jodie Read
Nov 18, 20211 min read
ISO 27001 & ISO 22301 success for The Maltings Document Storage Solutions Ltd
The Maltings Document Storage Solutions Ltd (MDSS) specialises in the provision of document storage, scanning and destruction. They have...
0 comments
Maria Williams
Nov 17, 20212 min read
Is your business in danger of becoming a cyber security dinosaur like Jurassic Park?
John Hammond took the tour group to the main control room. “Everything is run from here, all the security is computerised, so everything...
0 comments
Maria Williams
Nov 3, 20212 min read
Don't let the gang blow the doors off your information security this Cyber Monday!
Professor Peach leaned back on the bunk in his cell and started reminiscing. “It was 50 years ago now, of course, and so much has...
0 comments
Jodie Read
Aug 12, 20211 min read
How secure is your information?
Are you sure about that? Once upon a time in 2018 when there was heightened awareness of the need to implement data privacy and...
0 comments
ethandcoombes
Apr 13, 20212 min read
UK companies handed stiff fines for GDPR breaches
One of the biggest changes brought in by the General Data Protection Regulation was the increase in fines for data breaches. Since its...
0 comments
ethandcoombes
Apr 6, 20212 min read
What are the three key pieces of legislation which govern the way we handle information?
Three years ago, one of the biggest changes to data protection legislation in our lifetime came into force in the UK. The General Data...
0 comments
Jodie Read
Nov 18, 20202 min read
Has your business mapped the equipment used by COVID-19 home workers?
Across the UK, thousands of organisations and businesses have employees working from home because of the COVID-19 pandemic. In our last...
0 comments
Jodie Read
Nov 11, 20202 min read
If your workplace is empty because of the Coronavirus, how secure is your information?
Thanks to the Coronavirus lockdowns, many workplaces have been left empty or barely used for months. In some parts of the UK, the...
0 comments
Jodie Read
Nov 4, 20202 min read
How has COVID-19 changed the way we deal with information security?
When the COVID-19 pandemic hit us, work changed radically. Companies had to make swift arrangements for employees to work at home or to...
0 comments
ethandcoombes
Sep 15, 20201 min read
"My dog ate the internet!"
Canine colleagues are great. Until they disrupt business continuity! Lucky is a rescue dog and he's still learning how to live in a home...
0 comments
tracey9920
Oct 7, 20152 min read
Cyber Security Alert!
How to protect yourself from invoice fraud "There are only two types of companies: those that have been hacked, and those that will be." ...
0 comments
bottom of page