Skip to content

6clicks Blog

Boundless Business Process Automation: Introducing 6clicks Integrations

Read More

Latest Posts

How do ISO 27001 and NIST CSF complement each other?

The NIST frameworks were designed as flexible, voluntary frameworks. The fact that they are flexible makes it relatively easy to implement them in conjunction with ISO 27001,..

Read More

ISO 27001 and NIST CSF Overview

ISO 27001 and NIST both involve establishing information security controls, but the scope for each varies on how they approach information security.

Read More

The Essential Eight Maturity Model For Cyber Security

Cyber crime is one of the biggest problems within society today. The impact that it has on businesses and the public is becoming more severe every day.

Read More

Boundless Business Process Automation: Introducing 6clicks Integrations

Melbourne, Australia — The missing link in the digital transformation of GRC integration is, well...integration!  So, we fixed that. Today, we are excited to announce 6clicks..

Read More

Unveiling the 6clicks Academy to Support Our Global Community

Melbourne, Australia — Global governance, risk and compliance (GRC) leader 6clicks has announced a new support platform to assist risk and compliance practitioners around the..

Read More

Driving Innovation in the US GRC Market

Phoenix, Arizona — Global governance, risk and compliance (GRC) technology leader, 6clicks, is excited to announce the appointment of Michelle Torrey-Teunissen as Chief Revenue..

Read More

Calculating Business Risk vs. Financial Risk

The operation of a business at any level, in any department, involves risk. Therefore, it is crucial that every person in an organisation understands the various risks associated..

Read More

New Reports and Minor Updates

I'm happy to be announcing some new updates to the reporting module, including a handful of new reports and enhancements to the reporting module. We have also made some nice..

Read More

Cyber Attacks on the Healthcare Sector

The healthcare sector deals with highly sensitive personal information. Most organisations are constantly combating cyber risks and are trying to adapt to this ever-changing age..

Read More