• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

IT Risk Management

Hong Kong’s Hutchison Group, which runs mobile carrier ‘3’, protests as USA puts it on new China ban list

December 23, 2020 by ITSecurity.Org Ltd

Trump administration is behind the times: used old name for Chinese company Hutchison sold ages ago

The CK Hutchison Group, the Hong-Kong-based conglomerate that operates the “3” mobile brand and maintains plenty of other telecoms investments, wants to clear its name after it appeared on a new list of companies the USA designates as military end users to which US companies cannot export.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

After 11 years, Australia declares its national broadband network is ‘built and fully operational’

December 23, 2020 by ITSecurity.Org Ltd

Those 35,000 connections that aren’t built? Celebrate the 11.86 million that were, says Minister

Australia has declared its national broadband network (NBN) is “built and fully operational”, ending a saga that stretches back to the mid-2000s.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

What’s that lurking behind the borked face of finance? Windows, of course

December 22, 2020 by ITSecurity.Org Ltd

Rule number one of sausage club: never ask what goes into the sausage

Bork!Bork!Bork!  ATMs are like sausages. Everyone likes them, but nobody wants to know what lurks inside. Come take a peak with another edition of The Register‘s look at computers behaving badly.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

North of England NHS buyers name IT consultants who got in on £200m framework deal

December 22, 2020 by ITSecurity.Org Ltd

Hundreds of millions of pounds’ worth of consultancy work farmed out

Deloitte, Atos, and Phoenix Software are among the 29 organisations who’ve been picked to provide a whopping £200m worth of IT consultancy services to the National Health Service in the north of England.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

Buggy chkdsk in Windows update that caused boot failures and damaged file systems has been fixed

December 22, 2020 by ITSecurity.Org Ltd

Improving Windows’ quality by making it not boot?

A Windows 10 update rolled out by Microsoft contained a buggy version of chkdsk that damaged the file system on some PCs and made Windows fail to boot.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

Earth observation chief Dr Josef Aschbacher takes reins at European Space Agency

December 22, 2020 by ITSecurity.Org Ltd

Also: Rocket Lab rounds out a busy year, OneWeb returns to constellation work, NASA ploughs ahead with Orion

In brief  Dr Josef Aschbacher will succeed Jan Wörner as director general of the European Space Agency once Wörner’s term ends on 30 June 2021.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

UK firm NOW: Pensions tells 1.7 million customers a ‘service partner’ leaked their data all over ‘public software forum’

December 22, 2020 by ITSecurity.Org Ltd

Compromised info include names, email addresses, DoBs, and National Insurance numbers

Workplace pension provider NOW: Pensions has emailed its near 1.7 million UK customers to warn about a data leakage caused by contractor error.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

UK firm NOW: Pensions tells some customers a ‘service partner’ leaked their data all over ‘public software forum’

December 22, 2020 by ITSecurity.Org Ltd

Compromised info include names, email addresses, DoBs, and National Insurance numbers

Updated  Workplace pension provider NOW: Pensions has emailed a number of UK customers to warn about a data leakage caused by contractor error.…

Filed Under: Cyber-Security, GDPR compliance, IT Risk Management, IT Security, IT Security Governance

  • Page 1
  • Page 2
  • Page 3
  • …
  • Page 13
  • Next Page »