Skip to content

The Best of GRC Thought Leadership

Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.

Latest Posts

5 Top Questionnaires to Assess Vendor Cybersecurity in 2022

The top 5 vendor risk assessment questionnaires for 2023

A vendor risk assessment questionnaire is a highly effective tool for organizations to identify any potential risks posed by their outside vendors. This kind of questionnaire aims..

Read More

Cyber Security Risk 101: Introduction, Frameworks and Management

Cyber security risk 101: Introduction, frameworks and management

More than ever, organizations of all sizes are finding themselves under increasing pressure to mitigate and manage cyber risk.  With cybercrime soaring and cyber incidents..

Read More

information security management system (ISMS)

Use case spotlight: Information Security Management System (ISMS)

If you need to protect customer and company information (that is almost all of you), an Information Security Management System (ISMS) based on ISO/IEC 27001 or NIST Cyber Security..

Read More

How To Run a COVID19 Risk & Cyber Detox

How to run a COVID19 risk & cyber detox

Before you go back to work, read this. 2020 Has Not Been Kind To Business Even though the previous one didn’t end that great either, COVID-19 is a massive wake-up call for every..

Read More

Why Your Start-up Can Be A Success

Why your start-up can be a success

Introduction Cybersecurity: the key to scaling your Startup!  How exciting is it to be a Startup!? The possibilities, the pressure, the pure energy. Makes you feel alive eh?..

Read More

Meeting ASD Essential 8 requirements and ensuring compliance

The ASD essential 8 maturity model: A practical guide

Essential 8 and cyber security: A Practical Guide to Protect Your Business The digital age is redefining how businesses operate on every level. Technologies such as the cloud,..

Read More

5 reasons why spreadsheets don't work for managing risk assessments

Introduction If your organisation relies on Excel and Word as its preferred tools for managing compliance and risk assessment, this could have disastrous consequences for the..

Read More

Revealed: How to develop effective cyber vendor governance

Introduction There’s no doubt that working with third-party vendors and/or suppliers carries a very real risk, particularly in the context of regulatory requirements. In 2018..

Read More

Streamlining sales for your startup: Cybersecurity and trust

  In Critical to the success of any startup is figuring out the most effective sales process. This is typically very iterative, with lots of learnings along the way. However, one..

Read More