The Role of the Data Protection Officer (DPO)

A data protection officer (DPO) is an enterprise data governance role which has been pushed into the limelight by the General Data Protection Regulation (GDPR), which comes into force on 25th May 2018. Data protection officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.

How Does ISO 27001 Help with GDPR Compliance?

The EU General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. It will supersede all EU member states’current national data protection laws and bring a standardised approach to data protection throughout the EU. The Regulation also comes with a new suite of enforcement powers for supervisory authorities throughout Europe (ICO in the UK)

GDPR – The Key Changes to Data Protection Regulation

The following article is an overview of the main changes underGDPR and how it differs from the previous 1995 directive. The aim of the GDPR is to protect all EU citizens from privacy breaches in the context of the modern, data-driven world. The data landscape is a vastly different place from the time in which the 1995 directive was created. Although the main principles of data privacy are still true to the ’95 directive, a number of significant changes have been made.

Manchester Businesses Against Homelessness

This is a call to all Manchester businesses to help end homelessness and street sleeping in our great city for just fifty quid. Lets all ACT TOGETHER TODAY and make Manchester a better place for everybody to live and work in, for ever. If you can think of anything that would benefit everyone in our city more in a short space of time, then by all means, do that instead. Otherwise, no excuses. Get you credit card out. Manchester Mayor, Andy Burnham, is targeting £100K to end rough sleeping in the Greater Manchester by 2020. At time of writing the

What is the ISO 27001 Statement of Applicability

The Statement of Applicability (SoA) is referred to in ISO 27001 Clause 6.1.3 d and is the central document that defines how you will implement a large part of your information security. It is the link between the risk assessment and how risk treatment is implemented in your information security management system. Its purpose is to define which of the 114 suggested security controls from ISO 27001 Annex A you will apply. And for the ones that are applicable, how they will be implemented. It is worth noting that Annex A is considered to be comprehensive but not exhaustive for

Why Should IT Companies Implement ISO 27001?

It would be unusual for an IT company to have no controls in place to manage information security.However, this is often because tech-savvy employees know how to configure their systems securely and not necessarily because there is a structured Information Security Management System (ISMS) in place. IT companies are often good at technology but not as good at structure, policy and management systems.

Smaller Businesses are More Vulnerable to Cyber-Crime

It’s a little-known fact that smaller businesses are more vulnerableto cyber-attacks than most larger companies. Smaller budgets and fewer resources means that small to medium-sized companies are less willing to pay for vulnerability assessments or penetration testing of theirs and websites. The question is, how money is this choice not to protect online networks costing small businesses? According to the Federation of Small Businesses it amounts to somewhere in the region of £785 million a year. That astounding figure is the penalty SMEs pay when they fall victim to online fraud and malware.

Demand for ISO 27001 is Growing – Be Prepared

Cybercrime is rarely out of the news these days. News of the latest attack on a high-profile target seems to be a daily event, whilst the UK Government also seems to be taking it very seriously by pumping a reputed £1.9bn into cyber security. It may seem like a new issue but, in truth, Information Security has always been a threat to individuals, organisations and governments, it’s just that new methods have been adopted as the technology has changed. The major factor in the last two decades has been increased internet use in all aspects of life, which has resulted

The Risks of Using Dropbox for Business Data

The rise of online file-sharing solutions, such as Dropbox, means that distributing information is now easier than ever before.This is great news for collaboration and speed of executing business. The down-side of this, of course, it is also easier for information to fall into the wrong hands either intentionally or unintentionally. At the time of writing, Dropbox has over 200 million personal and business users and is the world’s leading solution for mobile file access.