

5 Min
10 types of cybersecurity for businesses in the UK
The rise in cybercrime is a growing concern. Read on to learn the different types of cyber security and how to protect your data in an organisation.
Read More5 Min
The rise in cybercrime is a growing concern. Read on to learn the different types of cyber security and how to protect your data in an organisation.
Read More6 Min
Data mapping not only allows compliance with the UK GDPR but also ensures that organisations understand every aspect of using personal data. Read more.
Read More3 Min
If you want to protect your company against cyber threats by getting cyber insurance, you’ll need to be prepared. Learn how ISO 27001 can help you here.
Read More5 Min
The penetration testing phase of ISO 27001 will ensure full security for your ISMS and eliminate potentially harmful gaps in your system. Learn more.
Read More4 Min
First-party data: What does it say about the quality of your data, and what is second-party and third-party data?
Read More3 Min
For achieving the TISAX® label, companies must first complete the TISAX® audit. We explain how this works best and also suggest valuable tips.
Read More2 Min
Level 1, 2 or 3 - which is the right one in the assessment on TISAX®? Get an overview of which level your organisation should aim for in the assessment.
Read More3 Min
A label for the assessment on TISAX® proves that your company fulfils the requirements it takes to guarantee InfoSec compliance. Which label do you need?
Read More3 Min
A strong information security policy is the foundation for protecting critical data, assets, and operations. Read on to learn more.
Read More4 Min
Cybersecurity management is a crucial part of information security. ISO 27032 can guide you through the best management practices to implement.
Read More