Tag: Cyber Security
-
Has compliance kept up with digital during the pandemic?
The pandemic has delivered 7 years of transformation in the space of a year but just as companies are facing up to the financial debts from the past year, so we are able to quantify the compliance debts to be paid through analysis of the DCMS breaches survey from 2021. I looked at last years study to see… Read more
-
Getting back to basics post COVID
After the largest transformational event in decades, which ripped the corporate rulebook up and forced organisations beyond the firewall and into home working and the Cloud, we are emerging into a new way of working after implementing 10yrs worth of corporate change into a couple of months. Just how useful was your compliance during COVID?… Read more
-
Creating the network platform for the data revolution
The recent announcement of the launch of a consultation on the government’s data strategy marks an important step in the United Kingdom’s evolution of its services industry. The opportunity from digital is clear The government states that they “need a data strategy that reflects the opportunities and challenges of our new hyper-digital world, one that ensures we weigh… Read more
-
Back to cyber security basics – learning from easyJet
Another day another breach, this time for EasyJet who announced that it has been the target of an attack from a highly sophisticated source. Here’s what has been published so far. “Our investigation found that the email address and travel details of approximately 9 million customers were accessed. These affected customers will be contacted in the next… Read more
-
Does board perception meet reality for cyber security?
During the lockdown due to the coronavirus, I’m struck by how rapidly society and healthcare are adapting to remote working in alignment with the government guidance in the UK. We have seen increasing tolerance towards using internet-facing systems for care of vulnerable patients and temporary relaxation of data protection and cyber security standards for health and social care.… Read more
-
COVID-19 and BCP – is your governance remotely working?
COVID-19 (Also known as coronavirus) has taken us all by surprise. The most interesting aspect though is the home working advice which will have driven a coach and horses through many certified management systems for information security (ISO/IEC-27001:2017) and business continuity (ISO/IEC-22301:2012). The reason for this is that many of these management systems rely on… Read more
-
The first GDPR fine is in – and it’s not Cyber related!
Happy New Year and health and happiness to all. The first financial penalty has arrived! As you have no doubt been enjoying the festive period and recharging your batteries, you’ll be forgiven for missing the first actual financial penalty under the applied General Data Protection Regulations (GDPR), implemented under the Data Protection Act 2018 (DPA… Read more
-
The importance of a common framework
Another day another notice from the ICO So we now have the second notice from the ICO in quick succession relating to the applied GDPR, this time in relation (at least in the face of it) to a data breach that was fully in the gift of Marriott to address that is currently intended to be… Read more
-
Looking beyond the hype of the BA fine
The hype behind GDPR fines is about to start… The recent announcement from the ICO regarding its intention to the fine BA for a data breach under the applied GDPR will certainly make headlines and result in a raft of new marketing pushing GDPR solutions. Before we all rush around declaring the dawning of the apocalypse, I’d… Read more
-
Is the data challenge just about being open?
The recent report from the House of Commons Science and Technology Committee on “The big data dilemma” (http://www.publications.parliament.uk/pa/cm201516/cmselect/cmsctech/468/468.pdf) raised some interesting challenges to be addressed. There is much to commend from the findings, but is the answer really about being looking at data, or are we missing areas that are still to be addressed prior to exploiting… Read more