NVT transitions to the updated ISO 27001 standard
We’re proud to announce that NVT has successfully transitioned to the updated ISO 27001 standard – the globally recognised benchmark for information security management.
This is the place to find a collection of NVT Group news reports, blogs and videos.
We’re proud to announce that NVT has successfully transitioned to the updated ISO 27001 standard – the globally recognised benchmark for information security management.
We’re thrilled to welcome Yann Cloitre to the NVT Group team as our new Business Development Manager. Yann brings with him a wealth of experience in business development, client relationship management and operational efficiency.
For the tenth year, an NVT Group business sponsored the Donald Dewar Debater of the Year Award.
Today we remember David R Crawford who passed away 10 years ago today. We also pay tribute to Anne Campbell and Graeme Muir.
The 2014 Ryder Cup at Gleneagles commenced ten years ago today. We look back at our “year like no other”.
NVT Group made another splash at the 2024 charity event in aid of St Columba’s Hospice Care, competing for the second consecutive year in the popular Dragon Boat Race on the Firth of Forth.
The 2014 Ryder Cup at Gleneagles commenced ten years ago today. We look back at our “year like no other”.
In this blog, we explain why the rise in data also means a rise in the need to protect it.
NVT Group explains how to maintain an effective IT function amid skills and labour shortages.
Reflecting on what’s been happening at NVT since the lockdown of March 2020.
Data Privacy Day For Data Privacy Day 2022, we’re once again looking at the latest figures published by the Department of Culture, Digital, Media & Sport, for its Cyber Security Breaches Survey. The most recent survey tells us that, whilst the number of businesses undergoing cyber risk assessments has risen by 3% in the past …
A regular cyber audit should be an integral part your organisation’s IT disaster recovery plan. Why? The tricks and techniques that cyber criminals use are forever evolving, which causes new system vulnerabilities to emerge continuously.