Backups
The information held on your computer systems and devices is probably irreplaceable. If it is lost or corrupted as a result of theft, being criminally compromised, physical damage or technical failure,...
View ArticleData Encryption
If your confidential data and communications (for example emails) are accessed by individuals or other organisations not authorised to see them, the consequences can be very damaging … fraud, identity...
View ArticleData Loss Prevention
Preventing your data from loss or falling into the wrong hands should be a key part of your IT strategy … and day-to-day housekeeping. The consequences of such events can include breaches of...
View ArticleData Protection Act
The Data Protection Act (DPA) in the United Kingdom is designed to protect the privacy and integrity of data held on individuals by businesses and other organisations. It ensures that individuals...
View ArticleInformation Access Management
It is vital to manage who has access to which information held by your organisation. This means physically enabling and restricting access to various information, and also having the ability to monitor...
View ArticleInformation Risk Assessments
In any aspect of business, it is impossible to safeguard against risks if you do not know what they are. Therefore, prerequisite to an information security strategy, is the preparation of an...
View ArticleData Breaches / Security Incidents
Your organisation should have a process in place for managing and reporting events or chains of events that compromise the confidentiality, integrity or availability of its information. Management It...
View Article