Risk Crew Blog

Your source of expert insights on risk management, compliance and security.

Resources Risk Management resources Resouce Type Article Blog Risk Management blog Virtual CISO blog

Maximising Security and Efficiency with CISO-as-a-Service

Many organisations are turning to implementing a CISO-as-a-Service option. The service is not only efficient, [...]

Virtual CISO blog Resources Risk Management resources Resouce Type Article Blog Risk Management blog

Unlocking the Potential: Exploring the Benefits of a vCISO

There is no doubt that the number of qualified and available cyber security experts is [...]

Risk Management blog Virtual CISO blog Resources Risk Management resources Resouce Type Article Blog

Hiring a Virtual CISO Verses a Full Time CISO Comparison

Most of us are aware that there is a huge gap of qualified cyber security [...]

Data Protection and Privacy

Resouce Type Article Blog Risk Management blog Data Protection and Privacy blog Resources Risk Management resources

PPI Principals of GDPR for Small Businesses: Navigating Data Protection

“So, all we have to do to implement these 11 chapters containing 91 articles in [...]

Resources GRC resources Resouce Type Article Blog Risk Management blog Data Protection and Privacy blog

3 Triggers for Conducting a DPIA

Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing [...]

Blog Risk Management blog Data Protection and Privacy blog

Personal Data Deletion Done the Right Way

Are you managing personal data deletion correctly under the DPA and GDPR? Does everyone in [...]

Risk Management blog Data Protection and Privacy blog Blog

Data Protection Officer Questions – Answered by a DPO

There are many questions about why a Data Protection Officer (DPO) is needed and what [...]

Blog Risk Management blog Data Protection and Privacy blog

Data Protection by Design and Default Explained

Previously known as ‘privacy by design’, “data protection by design and default” has always been [...]

Article Risk Management blog Data Protection and Privacy blog Resources GRC resources Blog Resouce Type

When Must You Complete a Data Protection Impact Assessment?

Data protection impact assessments (DPIAs) are a legal requirement for GDPR, to ensure people’s private [...]

Supply Chain Risk Management

Blog Risk Management blog Supply Chain Risk Management blog

MOVEit Attack – Security Tool Vendors Have Failed Us… AGAIN!

2023 MOVEit Cyber Attack to Affect the Masses Yet again, here’s a prime example of [...]

Article Blog Risk Management blog Supply Chain Risk Management blog Resources Resouce Type

Cyber Security Supply Chain Challenges in the Agrifood Sector

Guest Contributor: Benjamin Turner, Former Chief Operating Officer, Agrimetrics Shortly after Russia’s invasion of Ukraine, [...]

Risk Management resources Resouce Type Article Blog Risk Management blog Supply Chain Risk Management blog Resources

Supply Chain Cyber Attacks & How to Prevent Them

“There has been a 742% average annual increase in software supply chain attacks over the [...]

Risk Management blog Supply Chain Risk Management blog Resources Resouce Type Article Blog

Cyber Supply Chain Risk Management – Should Penetration Testing be Required?

Let us begin by describing how to approach Cyber Supply Chain Risk Management (C-SCRM) and [...]

Risk Management resources Resouce Type Article Blog Risk Management blog Awareness Training blog Resources

Get WFH Cyber Security at the Forefront of Staff’s Minds

Is your staff is staying resilient with protecting company information assets whilst Working from Home? [...]

Risk Management blog Awareness Training blog Blog

What’s a Mature Security Awareness Programme?

Good news. Bad news. The bad news is that cyber security threats to businesses are [...]

Malware and Ransomware

Risk Management resources Resouce Type Article Blog Risk Management blog Malware and Ransomware blog Resources

How a Ransomware Readiness Assessment Can Help Your Business Stay Safe

Ransomware is a type of malware that encrypts files and then seeks payment in exchange [...]

Malware and Ransomware blog Resources Risk Management resources Resouce Type Article Blog Risk Management blog

What is Ransomware? Four Examples You Should Know About

By now we all know the effect a Ransomware attack can have on an organisation. [...]

Risk Management blog Malware and Ransomware blog Resources Risk Management resources Resouce Type Article Blog

How to Outsmart the DarkSide Ransomware Group

The DarkSide Ransomware Group is one of the many gangs that continue to rebrand themselves [...]

Information and Cyber Security

Blog Risk Management blog Information and Cyber Security blog Resources Resouce Type Article

How Do You Conduct an Information Security Risk Assessment?

Information security risk assessments are crucial for any businesses that deal with any sensitive information [...]

Information and Cyber Security blog Resources Resouce Type Article Blog Risk Management blog

SaaS Security 101: Essential Strategies for Businesses

Software companies have naturally embraced the cloud. It provides countless benefits for their clients, ranging [...]

Risk Management blog Information and Cyber Security blog Blog

As a nation, are we cyber security aware?

In the following blog post, we are going to shine a spotlight on the general [...]

Blog Risk Management blog Incident Management blog Resources Resouce Type Article

How to Submit a Data Breach Breach Compensation Claim

What is a Data Breach Claim? “Someone stole my personal information and I want something [...]

Risk Management blog Incident Management blog Blog

How to Respond When Data Breaches Hit the Fan

Not many companies anticipate being the focal point of a significant data breach incident. However, [...]

GRC blog ISO 27001 blog Resources GRC resources Resouce Type Article Blog

Four ISO 27001 Compliance Key Areas You Should Know

Many things that are important in getting ISO 27001 compliant but in this blog post, [...]

GRC blog ISO 27001 blog Resources GRC resources Resouce Type Article Blog

How to Implement a Clear Desk & Clear Screen Policy for Your Organisation

You know that feeling when you walk into an office, and it looks like a [...]

Blog GRC blog ISO 27001 blog Resources GRC resources Resouce Type Article

How to Prepare for an ISO 27001 Audit

In the world of information security, there are many frameworks and countless guidelines. But among [...]

Blog GRC blog ISO 27001 blog Resources GRC resources Resouce Type Article

ISO 27001: Steps to Write a Statement of Applicability

ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]

Resouce Type Case Study Blog GRC blog ISO 27001 blog Resources GRC resources

How Agrimetrics Successfully Attained ISO 27001 Certification | CASE STUDY

About the Company Agrimetrics, founded in 2014, is a leading Agri-tech Centre dedicated to revolutionising [...]

Blog GRC blog ISO 27001 blog Resources GRC resources Resouce Type Article

ISO 27001 Clauses 4-10: A Complete Guide

ISO/IEC 27001  is an international standard for creating an information security management system (ISMS). It [...]

GRC resources Resouce Type Article Blog GRC blog ISO 27001 blog Resources

ISO 27001 Penetration Testing Requirements – Risk Crew

A common question that comes up when implementing ISO 27001 is: Should I include security [...]

ISO 27001 blog Resources GRC resources Resouce Type Article Blog GRC blog

ISO 27001 Information Security Tips to Jump the Hurdles of Compliance

When looking to embark on achieving ISO 27001 Compliance, every organisation should know what challenges [...]

Resouce Type Article AI Governance blog Blog GRC blog ISO 42001 - AI Management System blog Resources GRC resources

Ideation to Execution: Building Your AI Governance Framework

AI governance is the foundation of responsible AI usage. It’s a framework of policies, practices [...]

Resources GRC resources Resouce Type Article Blog GRC blog ISO 42001 - AI Management System blog

Get Ahead of the UK AI Regulation: Comply and Thrive

As artificial intelligence continues to reshape the way we all work and how enterprises operate, [...]

ISO 42001 - AI Management System blog Resources GRC resources Resouce Type Article Blog GRC blog

AI Governance – Secure the Future by Embracing Responsible AI Practices

AI in Simple Terms  At its core, AI is simply software that can ‘think’, ‘learn’, [...]

GRC blog ISO 42001 - AI Management System blog Resources GRC resources Resouce Type Article AI Governance blog Blog

Don’t Be Afraid of AI. Treat It Like an Insider Threat

If artificial intelligence wants to be human so badly, let’s start treating it like one. [...]

Blog GRC blog SOC 2 blog Resources GRC resources Resouce Type Article

Are You Getting Ready for a SOC 2 Audit? 5 Steps to Follow

Thinking About Getting Your Cloud Platform SOC 2 Compliant? If your company handles sensitive data, [...]

SOC 2 blog Blog GRC blog

Why Are SOC 2 Assessments Becoming More Popular in the UK and Europe?

This is a guest article written by Ty Brush. The author’s views are entirely his [...]

GRC blog SOC 2 blog Resources GRC resources Resouce Type Article Blog

12 Critical Policies for SOC 2 Compliance

If you are considering getting your organisation SOC 2 compliant, this blog should be an [...]

GRC blog SOC 2 blog Resources GRC resources Resouce Type Article Blog

How Long Does SOC 2 Compliance Take and How Can You Get Certified?

It seems like a long project to reach SOC compliance, right? Well, not if you [...]

GRC blog ISO 27001 blog SOC 2 blog Resources GRC resources Resouce Type Article Blog

ISO 27001 vs SOC 2: Apples and Oranges

What’s the difference between ISO 27001 verses SOC 2? Good question. SOC 2 is becoming [...]

GRC blog NIS2 blog Resources GRC resources Resouce Type Article Blog

NIS2 Directive Timeline & Requirements to Minimise Risks

NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]

GRC blog DORA blog Resources GRC resources Article Blog

Essential Information | The DORA Regulation in the UK

How does DORA apply in the UK? Although the Digital Operational Resilience Act (DORA) is [...]

Resources GRC resources Resouce Type Article Blog GRC blog DORA blog

DORA Compliance Checklist: Your Guide to Actionable Steps

Achieving compliance with the Digital Operational Resilience Act (DORA) may seem challenging, but with the [...]

Resouce Type Article Blog GRC blog DORA blog Resources GRC resources

An Overview to DORA’s Regulatory Technical Standards (RTS)

What is DORA and How Does it Differ from Existing Risk Management Frameworks? Well, DORA [...]

GRC blog DORA blog Resources GRC resources Resouce Type Article Blog

A Comprehensive Overview of the Digital Operational Resilience Act

Trying to understand DORA? Think of it like this: The Digital Operational Resilience Act (DORA) [...]

Blog GRC blog Cyber Essentials blog

Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott

As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr [...]

GRC resources Resouce Type Article Blog GRC blog Cyber Essentials blog Resources

Going Beyond Cyber Essentials Plus Certification

Once you have successfully attained Cyber Essentials Plus (CE+) certification and the celebrations are over, [...]

Resources Resouce Type Article Blog GRC blog Cyber Essentials blog

What Are the Benefits of Cyber Essentials Plus?

Certifying to Cyber Essentials Plus Although many organisations pursue Cyber Essentials Plus (CE+) certification in [...]

Cyber Essentials blog Resources Resouce Type Article Blog GRC blog

Can I get Cyber Essentials Plus Certification Remotely?

Many organisations have sought to achieve Cyber Essentials Plus (CE+) certification remotely (as opposed to [...]

Blog GRC blog Cyber Essentials blog

Cyber Essentials Plus – Your Burning Questions Answered

In our recent webinar, Achieving Cyber Essentials Plus, Nick Roberts and Taras Sachok provided valuable [...]

GRC blog Cyber Essentials blog Blog

Are You Considering the Cyber Essentials Framework?

If you’re considering gaining formal certification to Cyber Essentials Plus (CE+)…good for you!  Complying with the security requirements [...]

Security Testing blog Penetration Testing blog Resources Resouce Type Article Blog

How to Prepare for a Penetration Test

It is an undeniable fact that all applications and infrastructures are essentially in need of [...]

Penetration Testing blog Blog Security Testing blog

Mobile Banking Apps: The Risks, Threats and Solutions

Mobile banking apps have become the new normal for millions of people around the world, [...]

Blog Security Testing blog Penetration Testing blog

Cloud Technology Risks – The Cloudy Truth

Navigating the Treacherous Landscape of Security Risks In today’s fast-paced digital world, the adoption of [...]

Security Testing blog Penetration Testing blog Blog

What is Open-Source Intelligence? How to Get Started

Imagine a world intricately woven with connections, where information flows like a meandering river of [...]

Blog Security Testing blog Penetration Testing blog Resources Security Testing resources Resouce Type Article

Importance of Black Box Testing for Your Cyber Security Defence

In a world where the digital landscape keeps changing, how can we effectively protect our [...]

Security Testing blog Penetration Testing blog Blog

External Penetration Testing and How to Do It

What is External Penetration Testing External penetration testing also known as external network penetration testing [...]

Blog Security Testing blog Penetration Testing blog Resources Resouce Type Article

How Much Does Penetration Testing Cost | Risk Crew

Penetration testing, also known as ethical hacking or white-hat hacking, is like putting on a [...]

Penetration Testing blog Blog Security Testing blog

What are the Different Types of Penetration Testing?

If you’re considering a penetration test to identify and fix vulnerabilities within your business, you [...]

Resouce Type Article Blog Security Alerts blog Security Testing blog Red Team Testing blog Resources Security Testing resources

Why a Red Team Security Assessment is Crucial for Every Business

In today’s digital age, businesses are more vulnerable than ever to cyber-attacks. As a result, [...]

Resouce Type Article Blog Security Testing blog Red Team Testing blog Resources Security Testing resources

7 Key Benefits of Red Team Testing for Your Organisation

In an information or cyber security context, a Red Team is a group of ethical [...]

Security Testing blog Red Team Testing blog Resources Resouce Type Article Blog

Red Team Vs Blue Team – A Comprehensive Guide

With the ever-increasing threat of data breaches for many organisations, testing your security systems is [...]

Blog Security Testing blog Red Team Testing blog Resources Security Testing resources Resouce Type Article

Should You Conduct Red Team Testing Without a Blue Team?

We often hear the question: “Should we perform Red Team Testing without a Blue Team?” [...]

Blog Security Testing blog Red Team Testing blog

Clearing the Confusion: Red Team vs Penetration Test

More than often when organisations are directed by the board to deploy a Red Team [...]

Blog Security Testing blog Red Team Testing blog

Try Red Team Testing to Improve ROI

Typically, ROI is seen as money spent vs money received to see if the investment [...]

Resouce Type Article Blog Security Testing blog Red Team Testing blog Resources Security Testing resources

Top 8 Metrics to Collect During a Red Team Test

Why should we collect metrics in a red team test? Metrics are a valuable way [...]

Security Testing blog Red Team Testing blog Blog

Ready for Red Teaming?

Are you considering conducting Red Team testing? Have you ever conducted one? Maybe it’s time [...]

Blog Security Testing blog Social Engineering blog

10 Social Engineering Attacks You Need to Know

Simply put — social engineering works. Ask any Threat Actor in the business. Social engineering [...]

Social Engineering blog Blog Security Testing blog

How to Spot a Phishing Attack

Yes. We know. A lot has been written on how to spot phishing attacks over [...]

Security Testing blog Social Engineering blog Resources Security Testing resources Resouce Type Article Blog

Social Engineering Techniques – Hacking Human Behaviour | Risk Crew

Social engineering is a term used for a wide variety of activities used by threat [...]

Blog Security Testing blog Social Engineering blog Resources Security Testing resources Resouce Type Article

Top 5 Signs of Social Engineering Attacks

What are the Signs of a Social Engineering Attack and How Can You Prevent Them? [...]

Blog Security Testing blog Social Engineering blog

Don’t be Vulnerable to Vishing – Identify and Mitigate Risk

In this post, you’ll learn why vishing is successful and what you can do to [...]

Security Testing blog Social Engineering blog Blog

Why you should deploy Simulated Social Engineering Testing against your workforce

Social Engineering can be summed up as ‘hacking the human’. Traditional malicious hacking attacks a [...]

Security Testing blog Social Engineering blog Blog

Spear Phishing – Why you should “Fear the Spear”

SPEAR PHISHING, WHALING, BUSINESS EMAIL COMPROMISE AND CEO FRAUD IS ON THE RISE AND COSTING [...]

Security Vulnerabilities

Security Vulnerabilities blog Blog Security Testing blog

Enhancing the Security in Blockchain | Risk Crew

The Emergence of Blockchain Technology  How did we arrive at blockchain technology? Let’s start from [...]

Blog Security Testing blog Security Vulnerabilities blog

4 Business Questions About IoT Devices

Are your IoT devices secure? Internet of things (IoT) devices have seen year on year [...]

Security Testing blog Security Vulnerabilities blog Blog

How to Mitigate DNS Hijacking

The term Domain Name System (DNS) hijacking unfortunately tends to be misused in the industry, [...]

Blog Security Testing blog Security Vulnerabilities blog

Secure Your SME to Detour Hacker Attacks

It is estimated that six in ten SMEs that suffer a breach are likely to [...]

Security Testing blog Security Vulnerabilities blog Blog

The Importance of Minimising Your Attack Surface

With every security test, Risk Crew has performed, there has been at least one attack [...]

Let’s Chat

Whether you are just starting out with you GRC or have not begun, our experts are here to answer your questions.