As politicians and businesses take a public stance against Russia, members should be prepared for some kind of retribution from its cyber agents.
ICAEW marks the 20th anniversary of global Cyber Security Awareness month with a series of resources addressing cybercrime and how to protect your business.
Clear and concise explanations are given for the most common IT security expressions, phrases, acronyms and jargon.
Find out whether you should consider encrypting your data, how encryption works in practice and what types of appropriate technical and organisational measures are common.
This example password/pass phrase policy could be used by an organisation to help protect client and employee data. It is jointly published by ICAEW's Business Law and Tech Faculty.
This is the fifth in the series of Audit insights: cyber security reports. It focuses on the substantial gap in cyber security maturity levels caused by complex legacy IT environments and how business needs to adopt a smarter approach to cyber security laws and standards.
While the fundamentals on how to protect yourself, your business and your clients remain essentially unchanged, the context in which we write about them continues to shift. Cyber criminals are always finding new means of attack and we all need to keep up to keep them out.
Features and articles
As the run-up to Christmas starts in earnest, we observe more news in the cyber realm, from threats to the organs of our nation to how attacks might come from unexpected places.
As Charity Fraud Awareness Week 2023 kicks off, the latest Charity Fraud Report shows that instances of fraud across the sector continue to rise.
Enhanced trust, efficiency and security in financial markets make blockchain a promising innovation for the future of trading and asset management.
Key takeaways from the ICAEW Annual Conference, where artificial intelligence and technology took centre stage.
IFRS 15 Revenue from Contracts with Customers sets out the principles for when revenue should be recognised and how it should be measured, together with related disclosures. This factsheet answers some key frequently asked questions about the standard.
This cyber security guide explains how to best protect yourself, your business and your clients from cyber risks and threats. You can also find additional information in our dedicated cyber security resource centre.
A guide to protecting your accountancy business from cyber-attacks.
Complete the FDW eLearning course
ICAEW is collaborating with Deloitte to ensure its members and students have the knowledge and skills to take advantage of the opportunities offered by the fourth industrial revolution and to meet its challenges head on. Log-in to access exclusive eLearning content.
Webinars and recordings
On the latest ICAEW Insights podcast episode, we explore the month’s key developments in accountancy.
This webinar provides an opportunity to hear first-hand from the City of London Police what they are seeing on the ground in relation to cyber attacks on small and medium sized businesses.
Cybercrime is a major threat to all organisations regardless of size. This webinar will provide key takeaways to help your firm manage risk and stay safe.
In partnership with Mitigo, learn how to protect your firm from the latest cyber threats. This free one-hour webinar will help support accountancy firms build resilience against cyber-attacks and provide some key takeaways to help your firm manage risk and stay safe.
Disclaimer: The opinions expressed by external guest speakers in interviews or other publications included on this website are, by their nature, those of the speaker. They are not necessarily fully endorsed by the ICAEW or purport to reflect the official policies and views of the ICAEW or its members.
The Library & Information Service provides a hand-picked collection of industry press articles as a benefit of membership. If you are unable to access an article, please see our Help and support or contact email@example.com
The article discusses how artificial intelligence (AI) is impacting ethical hackers' work. It discusses AI can disrupt certain aspects of penetration testing and bug bounty programs; the hacking community believes that AI will never be able to replicate the creative thinking essential for ethical hacking; the use of generative AI by hackers, demographic shifts among hackers; and how the younger generation's different perspective on technology is influencing the cyber landscape.
The article focuses on data classification as a pre-requisite for data protection, security, and compliance, and it explores the tools available for data classification, including offerings from major tech companies as well as open-source options. It mentions these tools use machine learning and artificial intelligence to automate data classification, ensuring accurate data management and governance.
The article focuses on criticism directed towards Information Commissioner's Office (ICO) for its limited enforcement action against Thames Valley Police (TVP) and the Ministry of Justice (MoJ) regarding serious data protection failures that jeopardized the safety of witnesses and prisoners.
The authors discuss how CFOs and boards can support strategic resiliency and risk management skills as core competencies for creating and protecting long-term value. In a conversation together, they look at tools for long-term value creation, cybersecurity and resiliency, strategic resiliency and risk assessment, reputation risk, skills for business leaders, strategic life-cycle analysis and lessons on resiliency from bank failures.
Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security, an introduction to cyber security for executive/board-level staff and an explaination of what a common cyber attack looks like, and how attackers execute them.
Guidance from the Information Commissioner's Office (ICO) which gives advice for small businesses on how to keep IT systems safe and secure.
Government campaign to raise cyber security awareness. Gives advice on: protecting your device; protecting your data; and protecting your business.
Guidance from ENISA on the security risks and opportunities of cloud services for SMEs. Includes forms for assessing risks and opportunities and collecting relevant information about the security aspects of a cloud service.
ICAEW accepts no responsibility for the content on any site to which a hypertext link from this site exists. The links are provided ‘as is’ with no warranty, express or implied, for the information provided within them. Please see the full copyright and disclaimer notice.
Data protection and privacy
With the 30 June deadline approaching, the EU has agreed an adequacy decision for the UK, allowing the free flow of personal data from the EU to the UK to continue.
Data protection and privacy are matters of professional concern to accountants in practice, industry or commerce.
This resource centre provides a focal point for ICAEW members looking for support in managing cyber risks.
ICAEW Data Analytics Certificate programme will help you combine your commercial acumen and business knowledge with data analytics expertise.