ISO 27001 Resources
Ransomware Concerns for SMEs Raised in Parliament
Ransomware attacks have become increasingly common in recent years, and they can have a devastating impact on businesses, especially SMEs.
ISO 27001 Standard – Most Recent Updates and Revisions
Stay informed with our ISO 27001 updates page. Being informed could help protect your organisation and clients.
Strengthening Supply Chain Cyber Security with Cyber Essentials Plus and ISO 27001
Discover how Cyber Essentials Plus and ISO 27001 help UK businesses secure supply chains and strengthen cyber resilience.
ISO 27001 Requirements – A Comprehensive Guide
An explainer guide to the requirements for ISO 27001 certification in information security management.
UK GDPR Changes: What the New Rules Mean for Businesses in 2025/2026
Learn how the DUAA updates UK GDPR and PECR, introducing new rules on cookies, automation, consent, and ISO 27001 compliance.
ISO 27001 Key Requirements
Understand what the key requirements are for achieving certification toward ISO 27001.
ISO 9001 Vs ISO 27001 Key Requirements Checklist
Understand what the key differences are between achieving ISO 9001 and ISO 27001 certification.
ISO 27001 Checklist
Download your ISO 27001 Checklist here.
Cyber Security Month: Essential Compliance Checklist for UK Businesses
Cyber Security Month highlights how small steps boost protection. Check our Essential Compliance Checklist to spot gaps.
Ultimate SME Cyber Security Guide – Protecting Your Business
Boost your SME's cyber security with our essential guide. Achieve Cyber Essentials certification to protect assets and benefit from new opportunities.
Free Cyber Security Policy Template & Factors To Consider
Download our free cyber security policy guide & template for UK organisations. Includes best practices, risk assessment & step-by-step process.
AI and Cyber Security: Is It a Risk or an Opportunity?
Explore artificial intelligence's dual role in cyber security – enhancing defences and posing new threats. Help protect your business from cyber-attacks.
The Biggest Cyber Attacks Year by Year
Major attacks like SolarWinds and Colonial Pipeline reveal infrastructure flaws and prompt global calls for stronger cyber security.
Discover 8 of the Major Cyber Security Risks for Businesses in 2025
Discover 8 of the major cyber security risks to your business and how to effectively protect your digital assets.
Cyber Security Trends – Annual Updates & Insights by Year
Discover the latest cyber threat trends, from AI to ransomware. Learn how to tackle evolving challenges and safeguard your organisation effectively.
UKAS Approves British Assessment Bureau for ISO/IEC 27001:2022
British Assessment Bureau is now accredited to offer audits and certifications to ISO/IEC 27001:2022.
ISO 27001 Standard – Most Recent Updates and Revisions
Stay informed with our ISO 27001 updates page. Being informed could help protect your organisation and clients.
ISO 27001 Beginner’s Guide: Understanding The Standard
Discover the ISO 27001 standard with our comprehensive ISO 27001 beginner’s guide. Understand certification benefits, costs, and implementation steps.
How to Implement ISO 27001 Certification For Your Organisation
Secure your business with ISO 27001 Certification. Learn the step‑by‑step implementation strategies for robust, long‑term information security and compliance.
Maintaining ISO 27001 Certification for Your Business
Learn how to maintain your ISO 27001 certification.
Discover the Benefits of ISO 27001 Certification
ISO 27001 certification can help you implement a robust Information Security Management System. Discover the benefits of ISO 27001.
How Much Does ISO 27001 Certification Cost?
Discover the costs of ISO 27001 certification with our breakdown of what’s involved in the process, from training to audits.
What Is an Information Security Management System (ISMS)?
Protect your customers’ sensitive data with a robust Information Security Management System. Implement an ISO 27001-certified ISMS.
The Major Risks Associated With Cloud Computing
Is cloud computing as safe as it seems? Find out about the security risks and what you can do.
ISO 27001 and GDPR: How Do They Work Together?
ISO 27001 doesn’t guarantee compliance under the GDPR, but certification ensures your organisation is on the right track.
How ISO 27001 Can Help Businesses Respond to Data Breaches
How your organisation responds to and prevents data breaches is crucial. Discover how ISO 27001 can streamline and fortify the process.
Understanding Data Breach Causes & Response Strategies
Protect your organisation and customers from data breaches. Discover breaches happen and why they are on the rise.
How the Travelex Ransomware Attack Could Have Been Avoided
Find out how what Travelex could have done to avoid falling prey to cyber criminals that held them to ransom.
What Is a Legal Register and Does My Business Need One?
Learn about what a legal register is, why your business needs one and the role it plays in meeting ISO standards.
How ISO Certification Can Help with External Business Factors
Combat external factors affecting business with ISO certification. Learn how ISO standards and systems can help keep an organisation resilient and
What Is Red Teaming? And How Do You Do It?
Red teaming, a strategic exercise in challenging assumptions, tests organisational resilience. It identifies vulnerabilities, enhancing preparedness for real-world threats.
API Security Is a Data Breach Risk Organisations Ignore at Their Peril
API security is paramount in safeguarding against data breaches. Learn how to fortify your defenses against potential threats in our guide.
MFA Fatigue: How To Respond to Authentication Threats
Implementing multifactor authentication (MFA) to protect user accounts has for some years been recommended as a cyber security best practice.
LastPass Data Breach – Are Password Managers Still Secure?
If you’re a user of LastPass, you might have noticed some rather alarming headlines in December about a security breach.
Cyber Essentials vs ISO 27001 – What Are The Differences?
Cyber Essentials is a UK Government-backed scheme managed and maintained by the National Cyber Security Centre (NCSC).
Cyber Security Threats to MS 365 and How To Reduce Risks
It’s hard to imagine that a person reading this won’t have used Microsoft 365 or its desktop predecessor Microsoft Office.
Ransomware Trends Worth Paying Attention to in 2022
Discover the changing landscape of ransomware threats in 2022, from supply chain attacks to double extortion tactics.
DBS Record Keeping: Staying GDPR Compliant
There has been a surge of Security companies taking copies of DBS certificates and holding them on file.
What Is Digital Risk Protection and Do You Need It?
DRP is about securing the parts of a company’s digital presence that fall beyond the remit of traditional cybersecurity.
GDPR Update: Everything You Wanted To Know About GDPR in 2021
The GDPR has been in existence for over five years now. But for many companies it has faded into the background.
When Do You Need a Data Protection Officer?
A Data Protection Officer helps organisations to meet their regulatory obligations in relation to the processing and handling of personal data.
What Is Personal Data Under GDPR?
Get up to speed on GDPR, key definitions and what you need to do to correctly process sensitive information.
The Worst Data Breaches in History
We explore the worst data breaches that have happened, what their impact has been and the biggest fines issued under GDPR.
The Threat From Within
Barely a day goes by without a big corporate falling victim to a hacking attempt.