Blog
Recent blogs

Continuous Compliance With the PCI DSS
Published on
23
March
2026
TRENDING
URM’s blog outlines how continuous compliance fits into PCI DSS, and explores practical ways to integrate requirements into business-as-usual (BAU) operations.
Read more
Information Security
Published on
20/3/2026
ISO 27001 – Clause 6.3: The Importance of Planned ISMS Change ManagementTRENDING
URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.
Cyber Security
Published on
10/3/2026
Cyber Security and the Board: A Sign of What’s to ComeTRENDING
URM’s blog explains recent amendments to the Cyber Security and Resilience Bill, how they align with broader regulatory shifts, & practical steps to prepare.
Data Protection
Published on
5/3/2026
Data Protection Interpretation Affirmed by the Court of Appeal in DSG Retail CaseTRENDING
URM’s blog unpacks the DSG vs. ICO case, how it reached the Court of Appeal, & the Court’s decision on the status of pseudonymised data in the hands of attacker
Information Security
Published on
20/2/2026
Information Security Risk Assessment and Treatment: Understanding Relevant RisksTRENDING
URM’s blog explains the building blocks of information security risk, outlining how risks can be valued and prioritised, the role of rise appetite, and more.
Data Protection
Published on
16/2/2026
Managing DSARs and Other Data Subject RightsTRENDING
URM’s blog explores how DSARs can be used to drive improvements, and share our insights on managing other data subject rights efficiently and effectively.
Cyber Security
Published on
12/2/2026
NHS Cyber Security Open Letter: What Does it Mean for Suppliers?TRENDING
URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.
Cyber Security
Published on
4/2/2026
The Core Functions of NIST CSF: IdentifyTRENDING
URM’s blog unpacks the Identify Function of the NIST CSF, providing a detailed breakdown of its requirements and what you need to do to meet them.
Data Protection
Published on
26/1/2026
Analysis of Enforcement Action by the ICO in 2025 – Actions Way Down, Security Data Breach Fines Way UpTRENDING
URM’s blog analyses the ICO’s enforcement action in 2025, highlighting surprising trends in its approach to enforcing compliance with data protection law.
Data Protection
Published on
16/1/2026
Ten Top Tips for Achieving GDPR ComplianceTRENDING
URM provide ten actionable top tips that will allow you to take significant steps forward in your compliance journey.
Cyber Security
Published on
16/1/2026
Minimising the Impact When a Breach OccursTRENDING
URM’s blog explores the importance of cyber resilience & the steps organisations can take to prepare for and mitigate the impact of a cyber incident.
Cyber Security
Published on
8/1/2026
Strengthening Your Cyber Defences: Practical Steps for Every BusinessTRENDING
URM’s blog explores common weaknesses in organisations’ security programmes, & outlines practical, cost-effective measures to reduce the likelihood of a breach
Information Security
Published on
16/12/2025
ISO 27001 Control 8.17: Why Clock Synchronisation Is Critical for Security and ConformanceTRENDING
Read URM’s blog, where we explore the importance of clock synchronisation for cyber security and resilience, and how to meet the requirements of Control 8.17.
Data Protection
Published on
5/12/2025
Are Business Emails in Scope of Employee DSARs?TRENDING
URM’s blog explores the ICO’s guidance on business emails in DSARs & examine the implications of a recent ruling on the subject by the French Court of Cassation
Other Standards
Published on
24/11/2025
ISO 13485 and Beyond: Key Updates Shaping the Medical Device Regulatory LandscapeTRENDING
URM’s blog explores key updates to medical device standards, regulations & guidance documents, helping manufacturers understand what’s coming & how to prepare.
Cyber Security
Published on
20/11/2025
Cyber Security Case Study: The Human and Organisational Cost of a BreachTRENDING
URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.
Data Protection
Published on
14/11/2025
ICO’s Appeal in Clearview AI Case UpheldTRENDING
URM’s blog examines the impact of the latest ruling from the Upper Tribunal in the Clearview AI case, and the cross-border GDPR enforcement gap it exposes.
Cyber Security
Published on
7/11/2025
Cyber Essentials Requirements UpdateTRENDING
URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.
Cyber Security
Published on
31/10/2025
Deconstructing the EU Cyber Resilience ActTRENDING
URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.
Cyber Security
Published on
23/10/2025
The Core Functions of NIST CSF: GovernTRENDING
URM’s blog breaks down the NIST CSF’s new Govern Function, its importance, and the policies, processes and activities you will need to have in place to comply.
Information Security
Published on
16/10/2025
Preparing for a Successful SOC 2 AuditTRENDING
URM’s blog offers key advice on what to expect from your SOC 2 audit in practice, the types of evidence you will need to provide, how best to prepare, and more.
Cyber Security
Published on
7/10/2025
Building Cyber Security Resilience Against PhishingTRENDING
URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.
Cyber Security
Published on
18/9/2025
Impending UK Government Cyber Security Legislation on Ransomware PaymentsTRENDING
URM’s blog explains the Government’s new proposed measures around ransomware attacks and payments, which organisations they would affect, & why they are needed.
Data Protection
Published on
17/9/2025
Analysis of ICO Enforcement Action January-June 2025TRENDING
URM’s blog reviews the ICO’s data protection enforcement actions in Jan-Jun 2025, outlining changes and emerging trends in its approach to enforcing compliance.
Business Continuity
Published on
12/9/2025
7 Key Tips for Communicating in a CrisisTRENDING
URM’s blog provides top tips for communicating in a crisis & developing an effective communications plan to help maintain business continuity during disruption.
Information Security
Published on
5/9/2025
ISO 27001 Clause 5.1: Leadership and Commitment ExplainedTRENDING
URM’s blog explores Clause 5.1 of ISO 27001, what you must do to meet its requirements, and why leadership & commitment are vital to an effective ISMS.
Data Protection
Published on
29/8/2025
The Data Protection Implications of Using Body Worn Video TechnologyTRENDING
URM’s blog breaks down the data protection aspects of body worn video cameras, and how to ensure your use of BWV is compliant with the GDPR.
Cyber Security
Published on
14/8/2025
Understanding Defence Cyber Certification (DCC)TRENDING
URM’s blog explains what DCC is, how compliance with the scheme and the process to certification work, and the benefits to obtaining certification.
Information Security
Published on
8/8/2025
ISO 27001: How Certification WorksTRENDING
URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.
Cyber Security
Published on
5/8/2025
Critical Cyber Security Practices to Defend Against Ransomware AttacksTRENDING
URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.
Data Protection
Published on
25/7/2025
Getting Ready for the Social Tenant Access to Information Requirements (STAIRs)TRENDING
URM’s blog highlights the steps PRPs can take to prepare for the introduction of the STAIRs & ensure they are compliant when these requirements come into force.
URM regularly holds FREE webinars on GDPR
Find out more
how URM CAN HELP?
URM CONSULTING services
Book FREE Consultation
URM is pleased to provide a FREE consultation on Transitioning to ISO 27001:2022 for any UK-based organisation.
Read more
URM CONSULTING services
Get ISO 22301-ready with expert BIA support, BC plans, and implementation consultancy
We’ll help you develop and test robust BC plans, conduct BIAs with our Abriska® 22301 tool, and close any gaps. Partner with URM to meet ISO 22301 standards and protect your operations from disruption.
Read more
URM CONSULTING services
Do you need assistance managing your DSARs?
URM can offer a host of consultancy services to help you managing DSARs, DPIAs ROPAs, privacy notices, data retention schedules and training programmes.
Read more
"
URM’s in-depth knowledge of cybersecurity best practices and the Cyber Essentials framework helped us strengthen both ours and our client’s security posture while ensuring full compliance. Their consultants were professional, approachable, and incredibly thorough, offering practical advice tailored to the specific needs. The Cyber Essentials Plus assessment was conducted with great efficiency, and URM’s supportive approach meant we felt well-prepared at every stage. Thanks to their expertise, we successfully achieved certification for us and our clients, giving us (and our clients) greater confidence in our cybersecurity resilience.
contact US
Let us help you
Let us help you in your compliance journey by completing the form and letting us know how we can best support you.
