The 6clicks Marketplace provides a single source for apps and content that integrate with the core 6clicks GRC platform. The platform also connects businesses with customers and provides a variety of tools and resources to help them succeed.
{tableName=guides, name=UK Cyber Essentials, description=
This authoritative guide provides a comprehensive overview of the UK Cyber Essentials scheme, a government-backed initiative that helps organisations protect themselves against the most common cyber threats. It covers the scheme’, topic=null, hs_path=uk-cyber-essentials}--
{tableName=glossary, name=Incident Response, description=
Incident response is a set of procedures and processes for responding to and managing the aftermath of a security breach or cyber attack. It includes identifying the cause of the incident, assessing the damage, and implementing measures to prevent similar incidents from occurring in the future. It also involves communicating with stakeholders and responding to regulatory requirements. Incident response is an important part of an organization's overall security strategy and should be planned and tested in advance., topic=null, hs_path=incident-response}--
{tableName=glossary, name=Security And Integrity, description=
Security and Integrity are two important concepts in the field of information technology. Security refers to the measures taken to protect data and systems from unauthorized access, modification, or destruction. This includes the use of encryption, authentication, and access control. Integrity is the assurance that data and systems remain accurate, consistent, and reliable. This includes the use of checksums, hashing, and audit trails. Security and integrity are essential for protecting data and systems from malicious attacks, and ensuring that data remains accurate and reliable., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name='
Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value=
This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=security-and-integrity}--
{tableName=glossary, name=Data Owner, description=
Data Owner is a term used to refer to the person or entity responsible for the creation, maintenance, and control of a set of data. This includes the right to decide how the data should be used, who can access it, and who can modify it. Data Owners are responsible for ensuring the security, accuracy, and integrity of the data, as well as for ensuring that any changes to the data are properly documented. Data Owners are also responsible for ensuring compliance with applicable laws and regulations, as well as for ensuring that the data is used in a manner that is consistent with the intended purpose of the data., topic=null, hs_path=data-owner}--
{tableName=glossary, name=Australian Securities and Investments Commission (ASIC), description=
The Australian Securities and Investments Commission (ASIC) is an independent Australian government body that acts as Australia's corporate regulator. ASIC's role is to enforce and regulate Australia's corporate and financial services laws to protect consumers, investors and creditors. ASIC works to ensure that Australia's financial markets are fair, transparent and efficient. ASIC also administers the Australian Financial Services Licence (AFSL) system, which provides a framework for companies to offer financial services in Australia. ASIC also works to ensure that companies comply with their obligations under the Corporations Act 2001, including the disclosure of financial information and the regulation of financial products and services. ASIC also provides guidance to companies on their obligations and helps to protect investors and consumers from financial misconduct., topic=null, hs_path=australian-securities-and-investments-commission-asic}--