Skip to content
 Choosing the right risk and compliance software for private equity

Choosing the right risk and compliance software for...

In the dynamic world of private equity, managing risk and ensuring compliance across diverse portfolio companies can be particularly challenging. The complexities introduced by..

Read More

 Securing the future: the intersection of private equity and cyber

Securing the future: the intersection of private equity...

In today's digital age, data reigns supreme, serving as the new currency in the realm of business. Within this landscape, the synergy between private equity investment and robust..

Read More

 Lean portfolio management: technology to tackle cyber compliance

Lean portfolio management: technology to tackle cyber...

Welcome back to our blog, where we continue to explore the dynamic world of lean portfolio management. Today, we're diving into a crucial aspect of modern investing: the..

Read More

 Simplifying cyber, risk, and compliance for asset & portfolio managers

Simplifying cyber, risk, and compliance for asset &...

Managing cybersecurity, risk, and compliance can be daunting for portfolio managers, especially when dealing with a diverse mix of businesses. They face unique challenges before..

Read More

A guide to TISAX: IT security in the automotive industry

A guide to TISAX: Enhancing IT security in the automotive...

In the digital era, the automotive industry's reliance on information technology is undeniable, making robust IT security a critical concern. The Trusted Information Security..

Read More

 What is security compliance? Understanding the basics

What is security compliance? Understanding the basics

Security compliance involves a comprehensive approach to protecting sensitive data and complying with information security laws and regulations. By meeting security requirements,..

Read More

 My 25-year journey with Microsoft

My 25-year journey with Microsoft

Let me take a moment here. This month marks over 25 years of working with Microsoft, starting from my days as a cybersecurity engineer at Dimension Data, to the CEO of 6clicks. My..

Read More

 Why we chose the name 6clicks

Why we chose the name 6clicks

When you start a company, picking a name can be as hard as setting up the business itself. This was true for my co-founder Louis and I when we founded the company in 2019. We..

Read More

In sync for success: the power of partnership alignment

In sync for success: the power of partnership alignment

Last month, I found myself in an engaging conversation with a partner from one of the Big 4 firms, where a thought-provoking question was raised about our partnership philosophy..

Read More

 The Three Lines and how 6clicks can help

The Three Lines and how 6clicks can help

Effective risk management involves not only implementing security measures but also establishing governance processes that form a unified structure for mitigating risks. The Three..

Read More

 ISO 27001: Why do we need an ISMS?

ISO 27001: Why do we need an ISMS?

An Information Security Management System (ISMS) is designed to safeguard sensitive data and help organizations reduce risks and minimize the impact of cyber incidents. Providing..

Read More

 Breaking down an ISO 27001 policy

Breaking down an ISO 27001 policy

An information security policy is a requirement in the ISO 27001 standard that aims to demonstrate the commitment of an organization’s executive leadership team to information..

Read More