Articles

Is your business prepared for a blackout?
Since the talk of potential power outages and blackouts started, rumours and scaremongering abound - some have even taken to stockpiling should electricity supplies be cut.

Sport and cyber security
How can these things possibly be linked? A Sunday league kickabout, summer cricket tournaments and community netball matches aren’t strong candidates for a cyber threat, right? Wrong.

10 steps to achieving business continuity
According to ISO 22301, business continuity is defined as: ‘the capability of the organisation to continue delivery of products or services at acceptable predefined levels following disruptive…

Five key parts of the (secure) cycle of life
Secure SDLC is defined as the process of integrating security throughout the software development lifecycle, helping you catch issues in requirements before they manifest as security problems in…

Exercise your cyber security
Cyberattacks have continued to rise on three fronts; the number of attacks orchestrated, the level of sophistication demonstrated, and the impact inflicted.

Cyber Security for Critical National Infrastructure
Recent high-profile attacks on critical national infrastructure (CNI), such as Colonial Pipeline in 2020 and the Irish National Health Service in 2021, have underscored the serious threats posed…

Hacking for protection
Penetration testing is a process in which an organisation’s cyber security is put to the test by ethical hackers.

ISO27001 – worth it, or a pain in the annex?
Information security, cyber security and privacy protection remain high on the strategic agenda for most companies. ISO 27001 is changing. We find out how the new standard can help protect your…