
5 reasons to stop using spreadsheets to manage risk
Digital transformation was already well underway and with COVID-19, it’s now accelerating. What was a slow jog has turned into a full sprint with companies quickly adapting processes to meet
Digital transformation was already well underway and with COVID-19, it’s now accelerating. What was a slow jog has turned into a full sprint with companies quickly adapting processes to meet
Every year between the 8th and 12th of November quality professionals around the world celebrate their teams’ achievements and the contributions that quality management makes to delivering business excellence. “Managing quality means
Better visibility of risks Given that all of the data is stored in one place, IRM offers better accuracy and greater visibility of risk and compliance status. This means that
Third-party/vendor risk management is essential to ensure that vendors do not become the weak link in your security chain. However, gaining visibility into supply chain risks is very difficult and
With Cybersecurity Awareness Month coming to an end, and having explored a variety of topics such as how to prevent attacks such as ransomware, phishing and the benefits of a
We are now into the third week of US Cybersecurity Awareness Month, and the theme is ‘Explore. Experience. Share’, a rather general direction we’re interpreting as a call to spread
Drumz plc (LON:DRUM) is an investing company whose policy is to invest principally but not exclusively in the technology sector within Europe. On 4 September 2020, Drumz made an investment
In last week’s blog, we discussed ransomware, which is a type of malicious cyberattack that has been increasingly affecting US organizations at an alarming rate, demanding payments from victims in
Recently, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an updated advisory that warns against paying out ransomware demands and encourages a risk-mitigation approach, in
Security breaches through third parties have become increasingly common, as hackers seek vulnerable entry points to an enterprise’s information. In fact, more than half the companies surveyed recently in a