What are the typical IT and cybersecurity vulnerabilities across all industries?

Historically, IT and cybersecurity have mainly been focused on securing IT components, such as data, processes, IT services, servers, networks, etc. However, if the employee is the weakest link in the IT and cybersecurity chain, organisations must emphasizes the importance of identity, access management, passwords and patches. In a recent penetration testing against organisations in […]

In our training events, the participants retain 90 per cent of what they go through as reference material for future implementations

In our training events, the participants retain 90 per cent of what they go through as reference material for future implementations The Difference between Training and Learning from e-Compliance Academy certification courses: We provide an e-learning platform to enhance the organisation’s ability to learn so that the participants can translate that learning into actions under […]

Consequences of COVID is here to stay for a while before it is business as usual

Businesses must continue to adapt to respond and customise the challenges of COVID-19. All companies must continue to identify the changed tasks, adjust the approach to reflect the changing circumstances during these unprecedented times. Our encouragement focuses firmly on enabling innovation as gone are the days when GRC, IT security or data protection regulation was […]

This website uses cookies. By continuing to use this site, you accept our use of cookies.  Learn more