Countries could launch damaging attacks against gas pipelines and electricity grid, says assessment.
Source: Cyber attacks: China and Russia can disrupt US power networks warns intelligence report | ZDNet
InfoSec and Compliance – With 20 years of blogging experience, DISC InfoSec blog is dedicated to providing trusted insights and practical solutions for professionals and organizations navigating the evolving cybersecurity landscape. From cutting-edge threats to compliance strategies, this blog is your reliable resource for staying informed and secure. Dive into the content, connect with the community, and elevate your InfoSec expertise!
Jan 29 2019
Countries could launch damaging attacks against gas pipelines and electricity grid, says assessment.
Source: Cyber attacks: China and Russia can disrupt US power networks warns intelligence report | ZDNet
Jan 29 2019
The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your pre-commit hooks
Source: Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool
Jan 28 2019
A Chilean Senator has taken to Twitter with alarming news – the company running the country’s ATM network suffered a serious cyberattack.
Source: Attackers used a LinkedIn job ad and Skype call to breach bank’s defences
Jan 27 2019
Facebook Messenger, Instagram and WhatsApp are to be integrated under the hood so that messages will travel across a unified communications platform. So, what are the implications on privacy for users of these services?
Source: How WhatsApp Merger With Facebook Messenger Puts Your Privacy At Risk
Jan 25 2019
UK-based Fidus Information Security was targeted by angler phishing
Source: How a Security Vendor Tricked Social Media Phishers
Subscribe to DISC InfoSec blog by Email
Jan 25 2019
Malware can spread much more easily on obsolete platforms, warns security body. With less than a year until the end of Windows 7 support, don’t get caught out.
Source: Windows 7 migration warning: Plan now to avoid security worries later | ZDNet
Subscribe to DISC InfoSec blog by Email
Jan 24 2019
Google Alphabet incubator Jigsaw says knowing how to spot a phish plus two-factor authentication are the best defenses against falling for a phishing email.
Source: Google Creates Online Phishing Quiz
Subscribe to DISC InfoSec blog by Email
Jan 24 2019
More than 70% of tech professionals said security spending has increased in the past year, according to a Ping Identity report.
Source: Security is the no. 1 IT barrier to cloud and SaaS adoption
Jan 23 2019
Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization.
Source: Center for Internet Security releases Microsoft 365 benchmarks
Jan 23 2019
Here we have great news for all iPhone Jailbreak lovers and concerning one for the rest of iPhone users.
A Chinese cybersecurity researcher has today revealed technical details of critical vulnerabilities in Apple Safari web browser and iOS that could allow a remote attacker to jailbreak and compromise victims’ iPhoneX running iOS 12.1.2 and before versions.
Source: Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X
Jan 22 2019
Data belonging to online casinos found exposed online on unprotected Elastic search instance, it includes info on 108 million bets and user details
Source: Did you win at online casinos? Your data might have had exposed online
Jan 22 2019
Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be ‘smarter’ in their patching regimes and prioritize the i…
Source: Businesses can safely delay patching most vulnerabilities
Jan 21 2019
A new Rocke Group malware sample “captured” and analysed by Palo Alto Networks Unit 42 has adopted code to uninstall five cloud security protection products
Source: New Rocke Group Malware Turns off Your Cloud Security Tools
Jan 21 2019
A micropatch is now available for a zero-day vulnerability in Windows that allows unauthorized read access with the highest privileges to any file on the operating system.
Source: Windows Zero-Day Bug That Lets Attackers Read Any File Gets Micropatch
Jan 21 2019
An Iranian developer is promoting on a Telegram hacking channel the BlackRouter ransomware through a Ransomware-as-a-Service model.
Source: Iranian developer advertised BlackRouter Ransom-as-a-Service
Jan 20 2019
Cloud security experts weigh in with the practices and tools they prefer to monitor and measure security metrics in the cloud.
Source: 8 Tips for Monitoring Cloud Security
Jan 19 2019
Cyber security is among the essential subjects to boards, alongside business strategy and leadership. Your compelling case to gain an investment is now here!
Source: 3 Compelling Reasons To Invest In Cyber Security – Part 3
Sep 25 2018

A privacy notice is a public statement of how your organisation applies data protection principles to processing data. It should be a clear and concise document that is accessible by individuals.
Articles 12, 13 and 14 of the GDPR outline the requirements on giving privacy information to data subjects. These are more detailed and specific than in the UK Data Protection
Act 1998 (DPA).
The GDPR says that the information you provide must be:
The privacy notice should address the following to sufficiently inform the data subject:
Below is an example of a customisable privacy notice template, available from IT Governance here.
Example of the privacy notice template available to purchase from IT Governance
If you are looking for a complete set of GDPR templates to help with your compliance project, you may be interested in the market-leading EU GDPR Documentation Toolkit. This toolkit is designed and developed by expert GDPR practitioners, and has been used by thousands of organisations worldwide. It includes:
Sep 24 2018

By Laura Downes
Since the EU’s GDPR (General Data Protection Regulation) came into effect in May 2018, demand for DPOs (data protection officers) has increased. The Regulation stipulates that certain organisations must appoint a DPO to support their GDPR compliance. DPOs also have an essential role as intermediaries between relevant stakeholders, such as supervisory authorities, data subjects, and business units within an organisation.
Your organisation will need to appoint a DPO if it:
The GDPR does not stipulate the level of experience a DPO must have, meaning some organisations might appoint an internal team member who does not have the experience or qualifications required, leaving them wide open to error.
Why you should consider outsourcing your DPO
Suitably skilled and experienced DPO candidates are hard to find. Outsourcing the role not only satisfies the requirements of the GDPR but also ensures your organisation is employing proper data handling and privacy policies. Furthermore, there is no conflict of interest between the DPO and other business activities.
An external DPO can work for your organisation on a fixed-fee or a per-hour basis. Signing up to a DPO service also means you can rely on several experienced DPOs rather than just one, which means more hands on deck should you ever suffer a breach.
DPO as a service (GDPR)
IT Governance’s annual subscription DPO service offers you hands-on support from one of our qualified DPOs, who will serve as independent data protection expert to your organisation. Your appointed DPO will: