Blog
Recent blogs

ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and Conformance
Published on
16
December
2025
TRENDING
Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.
Read more
Data Protection
Published on
5/12/2025
Are Business Emails in Scope of Employee DSARs?TRENDING
URM’s blog explores the ICO’s guidance on business emails in DSARs & examine the implications of a recent ruling on the subject by the French Court of Cassation
Other Standards
Published on
24/11/2025
ISO 13485 and Beyond: Key Updates Shaping the Medical Device Regulatory LandscapeTRENDING
URM’s blog explores key updates to medical device standards, regulations & guidance documents, helping manufacturers understand what’s coming & how to prepare.
Cyber Security
Published on
20/11/2025
Cyber Security Case Study: The Human and Organisational Cost of a BreachTRENDING
URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.
Data Protection
Published on
14/11/2025
ICO’s Appeal in Clearview AI Case UpheldTRENDING
URM’s blog examines the impact of the latest ruling from the Upper Tribunal in the Clearview AI case, and the cross-border GDPR enforcement gap it exposes.
Cyber Security
Published on
7/11/2025
Cyber Essentials Requirements UpdateTRENDING
URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.
Cyber Security
Published on
31/10/2025
Deconstructing the EU Cyber Resilience ActTRENDING
URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.
Cyber Security
Published on
23/10/2025
The Core Functions of NIST CSF: GovernTRENDING
URM’s blog breaks down the NIST CSF’s new Govern Function, its importance, and the policies, processes and activities you will need to have in place to comply.
Information Security
Published on
16/10/2025
Preparing for a Successful SOC 2 AuditTRENDING
URM’s blog offers key advice on what to expect from your SOC 2 audit in practice, the types of evidence you will need to provide, how best to prepare, and more.
Cyber Security
Published on
7/10/2025
Building Cyber Security Resilience Against PhishingTRENDING
URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.
Cyber Security
Published on
18/9/2025
Impending UK Government Cyber Security Legislation on Ransomware PaymentsTRENDING
URM’s blog explains the Government’s new proposed measures around ransomware attacks and payments, which organisations they would affect, & why they are needed.
Data Protection
Published on
17/9/2025
Analysis of ICO Enforcement Action January-June 2025TRENDING
URM’s blog reviews the ICO’s data protection enforcement actions in Jan-Jun 2025, outlining changes and emerging trends in its approach to enforcing compliance.
Business Continuity
Published on
12/9/2025
7 Key Tips for Communicating in a CrisisTRENDING
URM’s blog provides top tips for communicating in a crisis & developing an effective communications plan to help maintain business continuity during disruption.
Information Security
Published on
5/9/2025
ISO 27001 Clause 5.1: Leadership and Commitment ExplainedTRENDING
URM’s blog explores Clause 5.1 of ISO 27001, what you must do to meet its requirements, and why leadership & commitment are vital to an effective ISMS.
Data Protection
Published on
29/8/2025
The Data Protection Implications of Using Body Worn Video TechnologyTRENDING
URM’s blog breaks down the data protection aspects of body worn video cameras, and how to ensure your use of BWV is compliant with the GDPR.
Cyber Security
Published on
14/8/2025
Understanding Defence Cyber Certification (DCC)TRENDING
URM’s blog explains what DCC is, how compliance with the scheme and the process to certification work, and the benefits to obtaining certification.
Information Security
Published on
8/8/2025
ISO 27001: How Certification WorksTRENDING
URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.
Cyber Security
Published on
5/8/2025
Critical Cyber Security Practices to Defend Against Ransomware AttacksTRENDING
URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.
Data Protection
Published on
25/7/2025
Getting Ready for the Social Tenant Access to Information Requirements (STAIRs)TRENDING
URM’s blog highlights the steps PRPs can take to prepare for the introduction of the STAIRs & ensure they are compliant when these requirements come into force.
Information Security
Published on
18/7/2025
ISO 27001:2022 - A.5 Organisational Controls (Business Continuity)TRENDING
URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard
Cyber Security
Published on
11/7/2025
Supplementing Cyber EssentialsTRENDING
URM’s blog outlines the practical measures you can take following Cyber Essentials certification to further enhance your information & cyber security posture.
Information Security
Published on
3/7/2025
ISO 27001:2022 - A.5 Organisational Controls (Incident Management)TRENDING
URM’s blog breaks down the six incident management-related controls in Annex A of ISO 27001, providing key guidance on how to implement each control.
Data Protection
Published on
24/6/2025
DUA Act Finally Becomes LawTRENDING
URM’s blog explores the practical benefits of by the Data (Use and Access) Act and how they may reduce the data protection compliance burden on organisations.
Cyber Security
Published on
16/6/2025
Lexcel: Deconstructing Your Information Management and Security PolicyTRENDING
URM explains each control law firms must include in an information management and security policy that complies with the Lexcel Practice Management Standard.
Cyber Security
Published on
6/6/2025
Understanding Lexcel and the Specialist Quality Mark (SQM): How Cyber Essentials Can Benefit Your PracticeTRENDING
URM’s blog explores how Cyber Essentials can help your legal practice enhance its security posture and achieve/maintain its SQM or Lexcel accreditation.
Business Continuity
Published on
5/6/2025
Business Continuity Exercising TRENDING
URM’s blog explores BC exercising, including why it is beneficial, the different types of exercises, when they should be conducted, and who should be involved.
Quality Standards
Published on
29/5/2025
ISO 9001:2015 Clause 8.3: Design and DevelopmentTRENDING
URM’s blog explains Clause 8.3 of ISO 9001, its applicability, and the key considerations and practical steps required for conformance to this Clause.
Information Security
Published on
23/5/2025
ISO 27001:2022 - A.5 Organisational Controls (Legal, Regulatory and Contractual)TRENDING
URM’s blog explains the legal, regulatory & contractual controls in ISO 27001 & how they can be implemented in full conformance with the Standard.
Information Security
Published on
16/5/2025
ISO 27001:2022 - A.5 Organisational Controls (Information Security Management)TRENDING
URM explains the 8 information security management controls included within the ‘Organisational controls’ theme and how to prepare for an audit of each control
Information Security
Published on
9/5/2025
ISO 27001:2022 - A.5 Organisational Controls (Access Management)TRENDING
URM’s blog explores why the access controls in ISO 27001 matter, and how to implement each control in full conformance with both the Standard and best practice.
Cyber Security
Published on
1/5/2025
Cyber Essentials Questions Answered: Technical Requirements, BYOD Compliance and the Future of the SchemeTRENDING
URM’s blog answers key questions about CE, focusing specifically on its technical requirements, use of BYOD, and how the scheme may change in the future.
URM regularly holds FREE seminars and webinars on implementing ISO 27001
Find out more
how URM CAN HELP?
URM CONSULTING services
Rapid Penetration Test Quote
Do you need support in meeting your annual PCI DSS penetration testing requirements? CREST-accredited URM can complete internal and external penetration tests for your organisation.
Read more
URM CONSULTING services
Looking to achieve ISO 9001 certification?
With 20 years’ experience and 400+ successful projects, URM’s expert consultants will guide you every step of the way—no failures, just results. Partner with us and get certified with confidence.
Read more
URM CONSULTING services
Do you need assistance managing your DSARs?
URM can offer a host of consultancy services to help you managing DSARs, DPIAs ROPAs, privacy notices, data retention schedules and training programmes.
Read more
"
Complicated topic summarised really simply making GDPR accessible. I would love a recording as was distracted part way through and would like to re-enforce my knowledge by listening again (possibly a couple of times just to get it to sink in......)
Webinar 'GDPR - Back to Basics'
contact US
Let us help you
Let us help you in your compliance journey by completing the form and letting us know how we can best support you.
