Tags » ISO27001

Security for the Internet of Things

Every device connected to the Internet is a potential threat to information security. In the new world of the Internet of Things (IoT), there could be… 392 more words

Information Security

How many companies would pay Ransomware hackers?

If Ransomware did get into a network 31% of companies say they would pay the hackers to regain access to their data. This figure is from an… 177 more words

Information Security

Windows 10, is WiFi Sense sensible?

Windows 10 will be here in less than a month. The WiFi Sense feature, copied from Windows Phones, may be a security issue that allows unauthorized people access to some WiFi networks.  273 more words

Information Security

NEWS: Highest Information Security Tick For Unicorn

Unicorn Training’s information security standards have once again been ratified as being at the highest level following its latest annual British Standards Institution (BSI) ISO27001… 374 more words

Compliance

Reviewing user permissions, it may reduce costs as well as improving security

A key part of protecting information is to make sure users only have access to what they need to do their job. Permissions need updating when the role of an individual changes. 280 more words

Information Security

EU Data Protection Changes - What You Need To Know

Thank you to Dale Penn, one of the talented Advent IM Security Consultants for this informative guest post.

GDPR (General Data Protection Regulation)

Introduction

This January the European Commission revealed a draft of its GDPR. 612 more words

Information Security

What is Acceptable?

Every organization needs an Acceptable Use Policy (AUP) to define how their employees are expected to use IT facilities and handle information, and the consequences of not following the rules. 486 more words

Information Security