Tourists across Europe have reported in recent weeks that they are being targeted by scams imitating Booking.com. The bogus emails claim that recipients can receive a 20% discount at any hotel in the world. All they have to do is …
We’ve come a long way since the panic and scepticism that accompanied the introduction of the GDPR (General Data Protection Regulation). Several high-profile fines and the continued warnings from regulators have led to a sharp uptick in the number of …
Are you looking to take the next step in your career? If so, this is the perfect time to become a CISSP® (Certified Information Systems Security Professional). The qualification was developed and is maintained by (ISC)2, the International Information Systems Security Certification …
Welcome to our April 2023 review of cyber attacks and data breaches, where we review the biggest security incidents across Europe. Research from our sister site found 120 publicly disclosed security incidents during the month, which resulted in 4.3 million breached …
The rise of cyber attacks and data privacy concerns has information security a top priority for organisations. Many have chosen to mitigate the risk by implementing an ISMS (information security management system). Creating an ISO 27001-compliant ISMS is a big task, but the benefits it provides makes it an essential …
IT Governance led the world’s first ISO 27001 certification project and we’ve been at the forefront of the cyber security initiative ever since. Certification to ISO/IEC 27001 demonstrates to existing and potential customers that you have taken the necessary steps …
Italy’s data protection watchdog has given OpenAI, the parent company of the much-discussed language model ChatGPT, a set of instructions on how to safely process people’s personal data. It comes after the Garante per la protezione dei dati personal announced that …
A Dutch court has found in favour of drivers who accused the ride-sharing apps Uber and Ola of breaching their personal data rights. The complainants said that that their employer violated their rights in a number of instances, including when …
Phishing advice used to be straightforward. Don’t open an email that contains a suspicious attachment, and only trust websites with HTTPS domains. These have been two of the pillars of cyber security guidance for years. Messages from an unknown sender …
Amid the growing dominance of automated cyber crime tools like ransomware, it’s important to remember the dangers of traditional hacking methods such as MITM (man-in-the-middle) attacks. Let’s take a look at how it work and how you can guard against …