Phishing scams are among the most common and dangerous type of attack that organisations face. But what makes these attacks so successful?| IT Governance Blog
What's the difference between sensitive personal data and personal data? We explain everything you need to know.| IT Governance Blog
What is a lawful basis for processing under the GDPR? Do you always need consent? What exactly are legitimate interests?| IT Governance Blog
This week, we found 37,376,751 records known to be compromised, and 2,109 organisations suffering a newly disclosed incident.| IT Governance UK Blog
Find a comprehensive list of data breaches and cyber attacks for 2023, including our complete list of publicly disclosed security incidents.| IT Governance UK Blog