Computer Security Day is a timely reminder that protecting systems and customer data isn’t just an IT issue — it’s fundamental to business resilience and trust. For organisations handling cardholder data, compliance with PCI DSS is key to reducing the risk of breaches and ensuring secure transactions — especially during the year’s busiest shopping period. Simple steps like patching systems, using strong access controls, and encrypting sensitive information make a real difference in keeping data safe and maintaining compliance. Explore our PCI DSS services — from staff awareness training to penetration testing and consultancy 👉 https://lnkd.in/ebA73h65 #ComputerSecurityDay #CyberSecurity #PCIDSS #RetailSecurity
About us
Previously known as GRC International Group – home to industry-recognised names such as IT Governance Ltd, DQM GRC, ITGP and GRCI Law – GRC Solutions represents the next chapter in our evolution. For over 20 years, our extensive expertise has been trusted by thousands of organisations worldwide. Now, as GRC Solutions, we provide a comprehensive and integrated suite of products and services, encompassing IT governance, risk management, compliance with data protection and cyber security regulations. From small businesses to global enterprises, GRC Solutions is dedicated to supporting your success with scalable, affordable and fully customisable options that meet your unique needs.
- Website
-
https://www.itgovernance.co.uk
External link for GRC Solutions
- Industry
- Business Consulting and Services
- Company size
- 51-200 employees
- Type
- Public Company
- Specialties
- Cyber Security, Data Privacy, Penetration Testing, AI governance, PCI DSS, SOC 2, ISO 27001, Training, Consultancy, and Software
Employees at GRC Solutions
-
Bill Mitchell
-
Anthony E. Martinez
Helping Clients Protect Their Information, People and Reputation
-
David Higginson
Sales Leader at GRC Solutions | Helping Organisations solve Cybersecurity Challenges | Cyber Risk & Compliance Advocate
-
Roberta Ruja
Senior Sales Executive | GRC, Cybersecurity & Compliance Solutions | Helping Organisations Turn Risk Into Resilience
Updates
-
Free infographic: Can your staff spot a Black Friday scam? 🕵️♀️ Cyber criminals are using AI to create the most convincing scams yet. Can your team keep up? Black Friday is now one of the biggest opportunities for attackers—and the biggest risks for businesses. With 43% of UK organisations hit by a cyber attack this year and phishing still the #1 cause of breaches, your staff need to recognise the warning signs before it’s too late. Our infographic breaks down: ✅The latest AI-powered scam tactics appearing in 2025 ✅The most common red flags employees miss ✅Real-world data on the costs and impact of phishing ✅Practical steps to strengthen your organisation’s defences ✅Give your team the knowledge to stay safe this shopping season. Download here: https://lnkd.in/ecijBDuc #BlackFridayScams #CyberSecurityAwareness #PhishingPrevention
-
-
Black Friday is here — and so are the scams 🚨 Cyber criminals are taking advantage of the shopping rush with fake deals, spoofed emails, and phishing links designed to capture your data — fast. Before you click: ✔️ Check the sender ✔️ Hover over links ✔️ Avoid deals that are “too good to be true” ✔️ Use verified websites only Stay secure — and remind your team to stay vigilant. #CyberSecurity #BlackFriday #Phishing #InfoSec #Awareness
-
-
ISO 27001 Clause 6 – what’s changed and why it matters 👇 With ISO 27001:2013 certifications expiring at the end of this month, meeting the requirements of ISO 27001:2022's new Clause 6 has become a priority area for many organisations. Clause 6.2 now requires information security objectives to be explicitly documented, tracked and monitored. Meanwhile, Clause 6.3 introduces a formal requirement to plan all changes to the ISMS – closing a common gap in governance. These are not superficial changes. They reshape auditor expectations around ISMS maturity, traceability and evidence. Organisations with informal or disconnected approaches to objectives or change management may find they need to tighten discipline significantly. If you’re yet to complete your transition to ISO 27001:2022, this blog post will help you understand what’s changed. Read now: https://ow.ly/ke7S50Xg78I #ISO27001 #InformationSecurity
-
The best cyber defence isn’t just technology — it’s awareness👀 Phishing attacks account for 85 % of breaches (GOV UK) and are getting smarter with AI-generated messages and fake voices. Our Phishing Staff Awareness Course builds instincts, not just knowledge — helping staff think twice before they click. Empower your staff with our Phishing Awareness Course: https://lnkd.in/eq-mDABU #CyberSecurity #PhishingPrevention #AwarenessTraining
-
-
October 2025 sees over 21.2 million records compromised globally 👇 In our latest blog post, we detail how a staggering number of organisations were hit by cyber‐attacks last month — underscoring how urgent strong cyber resilience has become. (Read it here: https://lnkd.in/e4wVue2r) What you need to know: 🚨At least 21.2 million records were exposed in breaches during October 2025. 🚨The scale and frequency of breaches continue to rise — showing cyber-threats aren’t slowing down. For any business handling personal or sensitive data: the message is clear — you can’t assume you’ll be safe just because you’re “small”, “well protected” or “compliant”. What boards and leadership teams should do now: ✅Treat cyber-resilience as a strategic priority, not just an IT task. ✅Assume that attackers will breach vulnerable systems — how you respond matters just as much as prevention. ✅Implement the right baseline controls (including user access, patching, monitoring) that reduce exposure to these mass breaches. ✅Review supply-chain risk and ensure your third parties are also meeting high standards — many breaches originate via partners. ✅Make sure incident-response plans are robust: notification trails, legal exposure, customer trust recovery. At the moment where tens of millions of records are being exposed every month, strengthening your cyber defences is no longer optional — it’s business-critical. #DataBreach #CyberAttack #CyberSecurity #RiskManagement #BoardLeadership #ITGovernance #CyberResilience #UKBusiness
-
Phishing still hits the inbox — proving old tricks die hard. Even with awareness training, phishing remains the most common and disruptive attack among organisations that suffered a breach in the past year. (GOV UK) It’s time to test what really works: your filters or your people. Contact us for a penetration test and phishing simulation👉https://lnkd.in/e7XNxpvD #HumanFirewall #PenTesting #PhishingPrevention #CyberSecurity
-
-
How To Comply with ISO 27001’s New Cloud Services Control 👇 The ISO/IEC 27001:2022 update introduces Control A.5.23 – Information security for use of cloud services, which mandates organisations to establish policies and processes for acquiring, using, managing and exiting cloud services in line with their information-security requirements. Here’s why this matters – and what you need to do: ✅ With the majority of organisations now using cloud platforms, the risk-profile changes. The new Control reflects that reality. ✅ It demands alignment of people, processes and technology — you can’t just rely on “cloud provider security”. Key action areas: 🔵Define clear security requirements for any cloud service (e.g., encryption, MFA, roles & responsibilities) 🔵Select and monitor cloud-service providers against those requirements (shared responsibility model, data residency, supply-chain risk) 🔵Document your cloud-services policy and supplier register; ensure exit-strategies are in place. For boards and senior leadership: this is another reminder that cloud usage is a strategic risk, not just an IT problem. Ensure your organisation is meeting the new Control’s requirements — because auditors and regulators will expect it 👉 https://lnkd.in/eek2xB3T #ISO27001 #CloudSecurity #InformationSecurity #CloudCompliance
-
Is CISM still worth it in 2025? For professionals aiming to lead in cyber security, the answer is a resounding yes. The Certified Information Security Manager (CISM) qualification continues to deliver exceptional value – offering career progression, global credibility and salaries that reflect increasing demand. In today’s regulatory and threat-driven environment, organisations need leaders who can translate technical knowledge into business strategy. That’s exactly where CISM-certified professionals thrive. Explore: • How CISM supports the shift from technical roles to strategic leadership • What current salary benchmarks say about CISM’s value • Why employers across sectors are actively seeking CISM-certified talent • The real-world ROI of investing in this certification If you’re planning your next step in cyber security leadership, this is essential reading. 👉 Read the full article: https://ow.ly/t7il50XaF4Z #cybersecurity #CISM
-
Did you know? The average cost of a phishing-related breach in 2025 is now US $4.88 million (£3.71 million). (Deepstrike) That’s not just an IT issue — it’s a business-continuity threat. As phishing tactics evolve through deepfakes, voice cloning, and spoofed domains, no sector is safe. Book a penetration test to measure your resilience before attackers do ➡️ https://lnkd.in/e7XNxpvD #CyberResilience #PhishingSeason #CyberAwareness #ISO27001
-