Cyber Security Blog
Our cyber security blogs include advice, guidance, hints and tips on all aspects of cyber security and data protection.
What is the Difference Between Confidentiality and Privacy in SOC 2?
This is a question that we often get asked by our clients. Both criteria can cause some confusion as they may seem to overlap and they often get talked about as one and the same, but they have different definitions.
AI and Cyber Security Risks
It seems like everybody is talking about AI (Artificial Intelligence) in terms of its benefits but not many are considering the unique risks that AI presents and there are many.
Benefits of SOC 2 Compliance
SOC 2 audit reports provide independent assurance about a service organisation’s information security controls and the operating effectiveness of those controls.
Transitioning to ISO 27001:2022
When, how and what organisations need to do to transition to the new Standard.
How Do We Get ISO 27001 Certification?
Ten easy steps to achieving ISO 27001 Certification.
Six Steps to Reduce Cyber Risk
Six simple steps that you can take now to maintain and improve the security of your data and help eliminate cyber risk factors.
The Cyber Security Risks of Remote Working
Working from home can introduce cyber security risks that should be addressed to ensure the safety of organisations and their employees.
Cyber Security A to Z
Our handy reference guide of the most common cyber security terminology.
What’s New in ISO 27001 2022?
The eagerly awaited update to ISO 27001 is finally here and as expected ISO 27001:2022 is not significantly different from ISO 27001:2013.
Top Five Backup Tips to Secure Your Data
Backups of data are essential for incident response and disaster recovery.
Strong and Secure Password Guidance and Tips
Our top tips and guidance for ensuring that your passwords are as secure as possible.
SOC 2 Audit FAQ - Part 3
In part 3 of our SOC 2 audit FAQ series we look at the role of the sub service organisation in the SOC 2 audit.
G Cloud 12 Approved Consultancy Services
We are very pleased to announce that for the second year running we are an approved G Cloud 12 supplier.
SOC 2 Audit FAQ - Part 2
In part 2 of our SOC 2 FAQ blog we cover the most frequently asked questions our clients ask when we’re delivering SOC 2 audit consultancy.
SOC 2 Audit FAQ - Part 1
In the first of our SOC 2 FAQ blog series we cover the most frequently asked questions our clients ask when we’re delivering SOC 2 audit consultancy.
CCS Digital Specialists Approved Supplier
Romano Security Consulting are delighted to have been accepted onto the Crown Commercial Services Digital Outcomes and Specialists 4 Framework.
Don’t Wait Until a Cyber Attack to Formulate an Incident Response Plan
Are you ready for a cyber incident?
What is SOC 2?
In this SOC 2 blog we’re hoping to dispel a few of the myths around the dark art of SOC 2 and provide some clarity on what SOC 2 is all about.