Blog
Recent blogs

Continuous Compliance With the PCI DSS
Published on
23
March
2026
TRENDING
URM’s blog outlines how continuous compliance fits into PCI DSS, and explores practical ways to integrate requirements into business-as-usual (BAU) operations.
Read more
Quality Standards
Published on
13/12/2024
ISO 13485: Medical Devices-Quality Management System ExplainedTRENDING
URM’s blog explains what ISO 13485, which organisations it applies to, its relationship with regulatory frameworks such as the UK and EU MDR, and much more.
Cyber Security
Published on
12/12/2024
Mitigating Cyber Risks: Why Cyber Essentials Matters More Than EverTRENDING
URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.
Data Protection
Published on
6/12/2024
Are You Getting Cookies Compliance Wrong?TRENDING
URM’s blog discusses the GDPR and PECR requirements on cookies, common noncompliant practices & how you can ensure your approach to cookies is compliant.
Data Protection
Published on
22/11/2024
Updated Data Protection Laws Introduced by Chile and IndiaTRENDING
URM’s blog explores the different requirements introduced by these new laws, and the likelihood of a subsequent UK/EU adequacy decision for each nation.
Artificial Intelligence
Published on
22/11/2024
Establishing Organisational Control Over Artificial IntelligenceTRENDING
URM’s blog discusses the need for policy in relation to the use of AI, real-world cases where AI has caused organisations issues & how to create an AI policy.
Cyber Security
Published on
14/11/2024
Cyber Essentials – What’s Changing in 2025? TRENDING
URM’s blog discusses upcoming changes to Cyber Essentials, including the changes seen in the Willow Question Set and how they may impact your organisation.
Information Security
Published on
5/11/2024
Developing an ISO 27001 Information Security PolicyTRENDING
URM’s blog discusses how to develop and implement an information security policy that fully conforms to both your organisation’s and ISO 27001 requirements.
Data Protection
Published on
31/10/2024
DUA Bill: An Initial AssessmentTRENDING
URM’s blog compares the Government’s new Data (Use and Access) Bill with the previous Government’s DPDI Bill, & how it may alter the UK GDPR when it is passed.
Cyber Security
Published on
24/10/2024
Enhancing Security in the Software Supply ChainTRENDING
URM’s blog discusses the security risks associated with the software supply chain & how both software developers and their clients can mitigate these risks.
Internal Audit
Published on
18/10/2024
Internal Auditing of Management SystemsTRENDING
URM’s blog explains how to plan and execute effective and conformant internal audits of management systems at each stage of the internal audit process.
Information Security
Published on
11/10/2024
SOC 2 ExplainedTRENDING
URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.
Information Security
Published on
4/10/2024
Implementing and Auditing ‘People Controls’ from ISO 27001:2022TRENDING
URM’s blog explains why ‘people’ warrants its own control theme in ISO 27001 and how to prepare for a people controls audit, offering advice for each control.
Data Protection
Published on
27/9/2024
Data Protection Considerations for Monitoring EmployeesTRENDING
URM’s blog offers key advice and detailed guidance on how to balance your organisation’s needs with GDPR compliance as you perform workplace monitoring.
Information Security
Published on
20/9/2024
ISO 27002, the Unsung HeroTRENDING
URM’s blog explains what ISO 27002 is, how it can benefit your organisation, & how you can use it to support your implementation of an ISO 27001-conformant ISMS
Data Protection
Published on
13/9/2024
How to Conduct a Legitimate Interest Assessment (LIA)TRENDING
URM’s blog discusses the importance of LIAs for maintaining compliance with the GDPR, as well as providing a step-by-step breakdown of how to conduct one.
Information Security
Published on
5/9/2024
Common Questions When Managing Supplier Information Security Risks TRENDING
URM’s blog answers key questions on supplier risk management, with a particular focus on the aspects to consider once a supplier has been selected.
Data Protection
Published on
30/8/2024
The ICO Issues its First Notice of Intention to Fine a Data ProcessorTRENDING
URM’s blog explores the first provisional monetary penalty imposed by the ICO exclusively on a data processor & the lessons that can be learned from the case.
Cyber Security
Published on
22/8/2024
Pitfalls to Avoid in your Penetration Testing ProgrammeTRENDING
URM’s blog explores common pen testing mistakes & how to avoid them, and simple improvements you can immediately implement to enhance your security posture.
Other Standards
Published on
16/8/2024
The EU Artificial Intelligence ActTRENDING
URM’s blog breaks down the EU AI Act and discusses its scope, requirements, how it will be enforced, how it may impact the UK & the rest of the world, and more.
Information Security
Published on
8/8/2024
How to Conduct Effective Supplier Information Security Risk ManagementTRENDING
URM’s blog provides a stage-by-stage breakdown of the key steps you will need to take to conduct effective supplier information security risk management.
Cyber Security
Published on
1/8/2024
10 Most Common Vulnerabilities Found in Pen TestsTRENDING
URM’s blog outlines the top 10 most common vulnerabilities we identify when conducting pen tests, the associated risks, and how they can be fixed/avoided.
Quality Standards
Published on
25/7/2024
5 Golden Rules for Implementing ISO 9001TRENDING
URM’s blog offers advice and guidance on how to implement and maintain an ISO 9001-aligned QMS and receive the maximum benefit from your investment.
Data Protection
Published on
18/7/2024
ICO Enforcement Action January – June 2024TRENDING
URM’s blog reviews ICO enforcement activities for the 1st half of 2024, highlighting trends & shifts in how it enforces against data protection breaches.
Cyber Security
Published on
12/7/2024
Access Control, Administrative Accounts and Password-Based Authentication in the Cyber Essentials SAQTRENDING
URM’s blog offers advice on answering questions in the Cyber Essentials SAQ which relate to access control, admin accounts and authentication methods.
Information Security
Published on
10/7/2024
A Guide to the Certificate in Information Security Management Principles (CISMP)TRENDING
URM’s blog discusses everything you need to know about the CISMP, including its benefits, who it’s suited to, the topics the CISMP covers, and more.
Data Protection
Published on
5/7/2024
Oral references now count as processing for GDPR purposes (in the EU at least)TRENDING
URM’s blog explores a recent ECJ ruling which dictates that oral job references are covered by the GDPR
Cyber Security
Published on
27/6/2024
Getting the Most from Your Pen Tests - During and AfterwardsTRENDING
URM’s blog outlines the key steps you can take during and after a penetration test to improve your organisation’s security posture.
Other Standards
Published on
5/6/2024
ISO 42001 Artificial Intelligence Impact Assessments (AIIAs)TRENDING
URM’s blog explores artificial intelligence impact assessments (AIIAs) and offers advice on how to conduct these assessments in full conformance with ISO 42001.
Data Protection
Published on
5/6/2024
Data Protection Considerations for Data AnalyticsTRENDING
URM’s blog explores the data protection considerations for data analytics tools, and how to reap their many benefits while still maintaining GDPR compliance.
Information Security
Published on
4/6/2024
PCI DSS v4.0: Targeted Risk AnalysisTRENDING
URM’s blog dissects the new PCI DSS requirements around targeted risk analysis, what they involve, and how the 2 types of TRA in the Standard differ.
URM is one of the UK's most trusted training providers in the areas of information security and governance. Check our training program.
Find out more
how URM CAN HELP?
URM CONSULTING services
Gain a sound grounding and practical interpretation of the GDPR and the DPA 2018!
By attending URM’s online BCS Foundation Certificate in Data Protection course, you will gain valuable insights into the key aspects of current DP legislation including rights of data subjects and data controller obligations.
Read more
URM CONSULTING services
Rapid Penetration Test Quote
Do you need support in meeting your annual PCI DSS penetration testing requirements? CREST-accredited URM can complete internal and external penetration tests for your organisation.
Read more
URM CONSULTING services
Do you know where your greatest vulnerabilities sit?
Find out through a Cyber Security Headline Assessment
Read more
"
Helpful synopsis of current issues and gaps (which I agree with!). Thank you
Webinar 'GDPR - Back to Basics'
contact US
Let us help you
Let us help you in your compliance journey by completing the form and letting us know how we can best support you.
