Skip to main content

All News

Want to Know the Latest Industry News?

BCMS, business continuity, business continuity management system, ISO, ISO 22301

Careers in Business Continuity - The Importance of Certification

Business continuity is defined as the “capability of an organization to continue the delivery of products and services within acceptable time frames at predefined capacity during a disruption”. Such disruptions can include fires, floods, data breaches, pandemics, and so on. During the last few years, largely due to the COVID-19 pandemic, business continuity has become a widely discussed topic and…

Read more

Remote Workers Targeted for COVID-Themed Cybersecurity Attacks

The global spread of the coronavirus has forced a shift in working arrangements for many organizations. Part of the necessary measures taken by organizations has been the change in the work environment from office-based to remote work.

Read more
Remote work business strategy

Remote Work as a Business Strategy

Strategic management or business strategy is the development and implementation of the key objectives set by the organization’s top management. Organizations may formulate various objectives depending on what they aim and plan to achieve in a certain period of time.

Read more
Articles Quarantine Tablet

Seven Articles You Can Read in Quarantine

As we spend more time in quarantine due to the public health security measures, you can use this time to read seven ICT-related articles we’ve picked for you.

Read more
Secure Remote Working Environment

Three Recommendations to a Secure Remote Working Environment

Remote work is a working option which allows individuals to work outside the designated office of an organization. There are different options of remote work that are applied by organizations. Depending on the size and operations, organizations may allow remote work to an individual or an entire team.

Read more
Certification Career Growth

Six Reasons Certification boosts Career Growth

The continuous growth of the ICT sector due to rapid technology advancements has exponentially increased the number of jobs worldwide. Professionals in the ICT sector are highly in demand, both in quality and quantity. For professionals and individuals interested to pursue a career in the industry, it has become crucial to obtain and maintain the necessary knowledge and skills in the workplace.

Read more
GDPR Myths

GDPR Myths

The General Data Protection Regulation (GDPR) is a regulation on protecting personal data of EU citizens within and outside the European Union (EU) and European Economic Area (EEA). The regulation covers all aspects of data protection including data processing activities, rights of data subjects, obligations of controllers and processors, security measures, conditions for consent, breach…

Read more
GDPR on Cloud Service Providers

The Application and Impact of GDPR on Cloud Service Providers

A Cloud Service Provider is defined as an organization that offers infrastructure, network services and business applications in the cloud. Organizations and individuals that use cloud services can easily share information and data in the cloud for business and personal purposes. Information and data in the cloud is stored on physical or virtual servers, which reside in the facilities of a cloud…

Read more
Risk Management

The Role of Risk Management and Business Impact Analysis in Business Continuity Management

Business continuity is defined by the International Standardization Organization (ISO) as the “capability of the organization to continue the delivery of products or services at acceptable predefined levels following a disruptive incident”. Business Continuity Management is the process of creating and maintaining systems that prevent and recover from potential threats risking the vitality of the…

Read more
Cybersecurity Awareness

5 Ways To Increase Cybersecurity Awareness in Your Organization

Technology advancements have transformed organizations by making their business operations more streamlined and ensuring business efficiency. The growth of technology has created a wide range of opportunities for organizations, but also introduced them to new risks and vulnerabilities. Every vulnerability has the potential to be exploited by a cyber attacker through a software, command or code.

Read more