ProtectComplyThrive
IT Governance Blog
  • About Us
  • Visit our Webshop
  • Menu
  • Blog Home
  • Business Continuity
  • Cyber Security
    • ISO 27001
    • Risk Management
  • Data Protection
    • EU GDPR
  • IT Best Practice
    • ITIL/ITSM/ISO 20000
    • Project Management
  • IT Governance
    • COBIT
  • PCI DSS
  • Other Blogs
    • Book Reviews
    • Breaches and Hacks
    • Fighting Cyber Crime
    • Guest Posts
    • Podcast
    • Toolkits

How to avoid being victimised by cyber crime

Nicole Lim 18th October 2018 Cyber Security
Cyber crime affects millions of organisations and individuals throughout the world, but the accelerating digital transformation taking place in the Asia-Pacific region makes the area particularly susceptible. In fact, in 2017, about one-third of cyber attacks perpetuated globally targeted the …
[Continue Reading...]

How can physical security breaches put your business at risk?

Nicole Lim 15th October 2018 Cyber Security
Many organisations overlook physical security risks when dealing with network security. Networks primarily exist as a set of complex connections revolving around physical anchors such as hard drives and servers that hold sensitive data. These components are vulnerable to physical …
[Continue Reading...]

Author podcast: Protect yourself from cyber threats and risks

Emma Bordessa 11th October 2018 Cyber Security, Podcast
Threats in the digital world are continually evolving and becoming increasingly diverse. It doesn’t matter if you are working in the most mature enterprise environment, unemployed or retired, whether you have a smartphone in your hand or only use an e-reader, you are …
[Continue Reading...]

ISO 27001:2013 and continual improvement

Nicole Lim 10th October 2018 Cyber Security, ISO 27001
ISO/IEC 27001:2013 outlines the requirements for establishing, implementing, maintaining and continually improving an ISMS (information security management system). As cyber security threats continue to proliferate, it has become vital to implement a robust ISMS. This has resulted in the remarkable …
[Continue Reading...]

10 tips to stay safe online

Nicole Lim 9th October 2018 Cyber Security
Cyberspace is expanding rapidly, and so are the risks associated with it. The more we hear about scams, hacks, malware and other threats, the more the Internet feels like a dangerous place – which, to some extent, it is. Cyber …
[Continue Reading...]

Lessons you can take from the SingHealth data breach

Luke Irwin 4th October 2018 Cyber Security, ISO 27001
Last week, the CSA (Cybersecurity Agency of Singapore) presented its findings regarding July’s SingHealth data breach. The incident affected 1.5 million people – just under a third of the country’s population – with criminal hackers accessing patients’ names, dates of …
[Continue Reading...]

49% of CEOs say cyber attacks are a case of ‘when, not if’

Luke Irwin 3rd October 2018 Business Continuity, Cyber Security, ISO 27001
A KPMG study has found that 49% of CEOs believe a successful cyber attack against their organisation is inevitable. This shouldn’t come as a surprise: the volume of attacks has soared in the past few years and there are simply …
[Continue Reading...]

The three pillars of information security

Nicole Lim 28th September 2018 Cyber Security, ISO 27001
Information security is often perceived to be all about technology. Although technology is a key element in any organisation’s security measures, on its own it cannot protect you from modern cyber threats. Instead, it is one of the three pillars …
[Continue Reading...]

ISO 27001 certification in 10 easy steps

Nicole Lim 27th September 2018 Cyber Security, ISO 27001
While technological advancements have enabled the expansion of businesses beyond conventional practices, it’s no secret that they have attracted the attention of cyber criminals more than ever. Consequently, cyber crimes are on the rise, and it is essential that organisations …
[Continue Reading...]

Thousands affected in Perth Mint data breach

Luke Irwin 25th September 2018 Data Protection, EU GDPR
A data breach at Perth Mint initially thought to have affected 13 customers turns out to have been far more extensive. The government-owned bullion mint and precious metals trader confirmed that about 3,200 records were breached, with names, addresses, passport …
[Continue Reading...]
  • ← Older posts

    Social Media

    Write for us

    IT Governance is looking to publish relevant, well-written, informative and original articles. If you have an article that meets these criteria, then please send it in.

    Categories

    • Business Continuity
    • Cyber Resilience
    • Cyber Security
      • ISO 27001
      • Risk Management
    • Data Protection
      • EU GDPR
    • IT Best Practice
      • Project Management
    • Other Blogs
      • Breaches and Hacks
      • Podcast
    • PCI DSS

IT Governance Asia Blog Copyright © 2023.