Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2024

What is SOC 2 Compliance?

SOC 2 is an information security standard was created by the American Institute of Chartered Public Accountants (AICPA), as a way to provide assurance of an organisation’s management of data. SOC 2 compliance provides a framework to assess against five Trust Service Criteria (TSCs) – but more on those later. There are two types of SOC 2 compliance: Type I and Type II.

Cyber Essentials or Cyber Essentials Plus? Which do you need? | Product Explainer

Cyber Essentials is worth getting. You probably know this already, but what about Cyber Essentials Plus? Which one do you need, which one should you get, which one's better? If these are questions you have, then boy do we have the video for you.

Network boundaries & Cyber Essentials

It’s not surprising that adoption of Cyber Essentials certification is growing steadily year on year. It’s a valuable certification to have, not least of all for the many commercial opportunities it presents. But as a Cyber Essentials Assessor, one thing I see repeatedly is that poor network boundary implementation making reaching certification harder than it has to be – especially for smaller organisations. That’s what I’m going to be looking at in this blog.

Why you need a consultant to pass ISO 27001

Implementing ISO 27001, the international standard for information security management, is a complex process that requires expertise, experience and careful planning. This blog explores why using a consultant for ISO 27001 implementation is crucial to not just ensure certification, but also (and perhaps more importantly), to build an information security management system that is tailored to your business and its objectives. To make sure your certification is actually working for you.