If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included words like “my opinion,” “my experience,”… but, not a single word about policy. “Which policy?” I was asked. Oh, something is, obviously, wrong. So, we started from the beginning. Information Security Management is one of the cornerstones of IT Service…

The three steps you should take to avoid a costly data fine

The increase in corporate mobile device use, fuelled by Bring Your Own Device (BYOD) and advances in technology, means there are many more ways in which data can be lost, whether through employee mistakes or malicious theft and sale of confidential information. As a result, GRC (Governance, Risk and Compliance) is one of the biggest issues facing companies at the moment. Unfortunately, the average business hasn’t realised this and remaining…