Cyber Essentials Scheme, how it benefits you, and fits your business budget

Turn back the clock and back to 2014. Take five and listen to "What is the Cyber Essentials scheme and how to comply with it" to help build a business case for your business. 

read more

Finding similarities between AML and IT Access (Account) Management

AML and Systems Access Control, they both are not linked in anyway, neither they share any close proximity. When slicing them into smaller chunks, it begins to show some insights...

read more

A year in review – 3.1 billion records leaked!

According to Lewis Morgan, a resident bloggers from IT Governance recently compiled a terrifying year’s end list of cyber attacks & data breaches. It comes to a shocking figure that 2016’s tops the last figure of 480 million from 2015 at 3.1 billion! What’s to come for 2017? The Calculation now runs at a total of 3,154,135,541 leaked records. The final number is bound to increase ... 

read more

Is there a need of GRC- Governance, Risk and Compliance for Small and Medium Enterprises, without suffering a heavy cost or discontinuity?

After a 3 hours meeting with senior folks from various organizations of different sectors, came to learn deeper about their difficulties in onboarding governance, risk and compliance.

read more

Third Party Risk Management, is this a pain only today to the enterprises?

Continue from previous post, the topic on Third Party risk came into the limelight. We begin to heavily leverage third party to do what we don’t specialize in, or not our business focus... 

read more