Software and firmware used by your organisation If hardware is the physical part of a server, computer, tablet or phone, software is the set of...
Uncategorised
When it comes to security, is your house in order? Or do you have a skeleton in the closet?
When it comes to security, is your house in order? Or do you have a skeleton in the closet?This Halloween, follow our simple guide to secure your...
Cyber Essentials – a rising star in the fight against cyber crime
Cyber security scheme celebrates 100,000 certifications Cyber Essentials is an effective, Government backed scheme that will help you to protect...
Accounting in the Cloud – the light and the shade (PART 2)
This is the second in a two part blog about cyber security in the cloud. The first part explores the changing practises in utilising elements of...
Accounting in the Cloud – the light and the shade (PART 1)
The winds of change Traditionally, when setting up an office, it would be necessary for organisations to make an initial investment for computer...
Cyber Security Threats for the Accounting Sector
People trust their accountants with confidential information about their business, their money and their personal data and consequently, accountants...
An in-depth look at the relaunch of IASME Cyber Assurance on the 25th July 2022, formerly IASME Governance
IASME is proud to announce the relaunch of their flagship information security standard, the IASME CYBER ASSURANCE STANDARD, formerly known as the...
Interview with Maritime consultant Malcolm Warr OBE
IASME make waves with the Maritime Cyber Baseline scheme, a certification for maritime vessels. Maritime consultant, Malcolm Warr OBE shows us the...
No Longer Black or White
Semiotics is the term used for the science of signs and how we create and communicate meaning. As human beings we are constantly trying to...
Phishing Attacks during Covid-19
The COVID pandemic has tested everyone; psychologically and physically but there are some people who have exploited it to make money and fame....