ProtectComplyThrive
IT Governance European Blog
Language
  • Dansk
  • English
  • Español
  • Français
  • Italiano
  • Nederlands
  • Svensk
  • About Us
  • Visit our Webshop
  • Menu
  • Blog Home
  • Irish Blogs
  • Business Continuity
  • Cyber Security
    • ISO 27001
    • Risk Management
  • Data Protection / GDPR
  • IT Best Practice
  • PCI DSS
  • Other Blogs

Booking.com Scam Catches Out Holidaymakers and Eurovision Fans

Luke Irwin 11th May 2023 News No Comments
Tourists across Europe have reported in recent weeks that they are being targeted by scams imitating Booking.com. The bogus emails claim that recipients can receive a 20% discount at any hotel in the world. All they have to do is …
[Continue Reading...]

How Much Does GDPR Compliance Cost in 2023?

Luke Irwin 10th May 2023 Data Protection, GDPR No Comments
How much does GDPR compliance cost in 2020?
We’ve come a long way since the panic and scepticism that accompanied the introduction of the GDPR (General Data Protection Regulation). Several high-profile fines and the continued warnings from regulators have led to a sharp uptick in the number of …
[Continue Reading...]

Enhance Your Cyber Security With Our CISSP Blended Learning Programme

Luke Irwin 4th May 2023 Uncategorised No Comments
Are you looking to take the next step in your career? If so, this is the perfect time to become a CISSP® (Certified Information Systems Security Professional). The qualification was developed and is maintained by (ISC)2, the International Information Systems Security Certification …
[Continue Reading...]

Cyber Attacks and Data Breaches in Review: April 2023

Luke Irwin 2nd May 2023 News No Comments
Cyber attacks and data breaches in review: February 2020
Welcome to our April 2023 review of cyber attacks and data breaches, where we review the biggest security incidents across Europe. Research from our sister site found 120 publicly disclosed security incidents during the month, which resulted in 4.3 million breached …
[Continue Reading...]

How to Implement and Maintain an ISO 27001-Compliant ISMS

Luke Irwin 27th April 2023 ISO 27001 No Comments
The rise of cyber attacks and data privacy concerns has information security a top priority for organisations. Many have chosen to mitigate the risk by implementing an ISMS (information security management system). Creating an ISO 27001-compliant ISMS is a big task, but the benefits it provides makes it an essential …
[Continue Reading...]

5 Benefits of ISO 27001 Certification

Luke Irwin 25th April 2023 Cyber Security, ISO 27001 13 Comments
Benefits of ISO 27001 Certification
IT Governance led the world’s first ISO 27001 certification project and we’ve been at the forefront of the cyber security initiative ever since. Certification to ISO/IEC 27001 demonstrates to existing and potential customers that you have taken the necessary steps …
[Continue Reading...]

Italy Gives OpenAI a ‘To-Do List’ After Banning ChatGPT

Luke Irwin 20th April 2023 News No Comments
Italy’s data protection watchdog has given OpenAI, the parent company of the much-discussed language model ChatGPT, a set of instructions on how to safely process people’s personal data. It comes after the Garante per la protezione dei dati personal announced that …
[Continue Reading...]

Uber and Ola Cabs Drivers Win Major Data Protection Case

Luke Irwin 18th April 2023 News No Comments
A Dutch court has found in favour of drivers who accused the ride-sharing apps Uber and Ola of breaching their personal data rights. The complainants said that that their employer violated their rights in a number of instances, including when …
[Continue Reading...]

Criminal Hackers Flip the Script with Two New Phishing Trends

Luke Irwin 13th April 2023 News No Comments
Phishing advice used to be straightforward. Don’t open an email that contains a suspicious attachment, and only trust websites with HTTPS domains. These have been two of the pillars of cyber security guidance for years. Messages from an unknown sender …
[Continue Reading...]

What is a MITM Attack? Definition, Prevention & Examples

Luke Irwin 11th April 2023 Cyber Security No Comments
How to defend against man-in-the-middle attacks
Amid the growing dominance of automated cyber crime tools like ransomware, it’s important to remember the dangers of traditional hacking methods such as MITM (man-in-the-middle) attacks. Let’s take a look at how it work and how you can guard against …
[Continue Reading...]
  • ← Older posts

    social media

    Recent Posts

    • Booking.com Scam Catches Out Holidaymakers and Eurovision Fans
    • How Much Does GDPR Compliance Cost in 2023?
    • Enhance Your Cyber Security With Our CISSP Blended Learning Programme
    • Cyber Attacks and Data Breaches in Review: April 2023
    • How to Implement and Maintain an ISO 27001-Compliant ISMS

    Categories

    • Business Continuity
    • Cyber Resilience
    • Cyber Security
      • ISO 27001
      • Risk Management
    • Data Protection
      • GDPR
    • French Blogs
    • Irish Blogs
    • IT Best Practice
      • ITIL/ITSM/ISO 20000
      • Project Management
    • IT Governance
      • COBIT
    • Italian Blogs
    • Microsoft Security
    • News
    • Other Blogs
      • Book Reviews
      • Breaches and Hacks
      • Product Blog
      • Technical Experts
    • PCI DSS
    • Penetration Testing
    • Phishing
    • Ransomware
    • SOC 2
    • Spanish Blogs
    • SWIFT
    • Uncategorised
IT Governance Blog En Copyright © 2023.