News & Blog Post

Author: inavate

ISO 27001

Changes to ISO 27001 – What You Need to Know

With the recent revisions of the ISO 27001 standard, it’s important for firms to understand the key changes and next steps to ensure transition to adhering to the standard. With over 20 years of experience as an ISO 27001 consultant and cyber security expert, Andy Brophy, Founder of Inavate Consulting, has led hundreds of independent audited

Continue Reading •••
Women in tech
Personal

Challenges Faced by Women in Tech

By Miral Laurie, Information Security Consultant Understanding the obstacles is the first step toward overcoming them. In the tech industry, these challenges are often deeply ingrained, necessitating a collective effort to dismantle. Gender Bias and Discrimination The gender pay gap remains a stark reality in tech. I vividly recall a moment when a male colleague,

Continue Reading •••
By Miral Laurie, Information Security Consultant
Personal

Empowering Women in Tech: Breaking the Glass Ceiling

By Miral Laurie, Information Security Consultant Miral here, proudly embracing my journey as a woman in the tech and cybersecurity realms. I’ve never been one to conform to labels, yet they’ve followed me throughout my life. From being labelled as ‘Hyper’ or ‘the why kid’ in my youth to earning the affectionate label of ‘Mad

Continue Reading •••
Cloud Security

Understanding ISO/IEC 27018: Protecting PII in a Public Cloud Environment

As businesses increasingly turn to the cloud for data storage and processing, protecting personal data has become a top priority. ISO/IEC 27018 is a standard designed to help cloud service providers protect personally identifiable information (PII) in a public cloud computing environment. If you’re a CTO looking to gain a deeper understanding of this standard

Continue Reading •••
Cloud Computing
Cloud Security

Understanding ISO 27017 and its importance in securing cloud computing environments

As more and more companies are adopting cloud computing to enhance their business operations, ensuring secure cloud environments has become a critical concern. The International Organisation for Standardisation (ISO) has created a set of standards that are specifically designed to establish and maintain information security controls in cloud computing environments. One such standard is ISO

Continue Reading •••
Business Continuity Management System
ISO 22301

ISO 22301: What is it and how it can benefit your business

Disasters can strike any company at any time, leading to devastating impacts to business operations. It is crucial for companies to have a robust Business Continuity Management System (BCMS) system in place to ensure quick recovery from disasters. But what exactly is business continuity management, and how can it benefit your business? This article explores

Continue Reading •••
AI
AI

The power of AI: Why incorporating acceptable use rules is essential

In today’s rapidly evolving technological landscape, Artificial Intelligence (AI) stands out as one of the most transformative innovations of our time. AI has permeated every aspect of our lives, from virtual assistants on our smartphones to autonomous vehicles and advanced medical diagnostics. While the potential of AI is awe-inspiring, it also brings about ethical and

Continue Reading •••
Cyber Security Awareness Month
Cloud Security

The key to digital security: Mastering Password Hygiene

In today’s digital age, ensuring the security of our online accounts and sensitive information is of paramount importance. Passwords are one of the first lines of defence against cyber threats, and yet, many people still use simplistic, easy-to-guess passwords and reuse them across multiple accounts. This can put individuals and their company at great risk.

Continue Reading •••
Cyber Security
Cyber Security

Enforcing the use of encryption

Cyber Security Awareness Month – Enforcing the use of encryption What is Encryption? Encryption is the process of converting data into an unreadable format that can only be deciphered by authorised parties it plays a pivotal role in ensuring the confidentiality and integrity of sensitive business information. In this blog, we’ll explore why enforcing encryption

Continue Reading •••
Cyber Security
Cyber Security

The importance of using approved software sources for cyber security

Businesses worldwide have suffered from security breaches that have cost them millions in damages and lost credibility. With the continuing technological advancements in today’s world, cyber risks continue to increase as cybercriminals find new ways to exploit company networks and steal significant data. It is essential to recognise the risks and understand the benefits of

Continue Reading •••

Sign up for Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit.