Get in Touch
What We Do
Work With Us
Refer a friend
Phishing and Ransomware
eLearning - Cyber and Compliance
Payment Card Industry Data Security Standard for Frontline Staff
Essential Phishing Awareness
Secure Remote Working
CIA - Confidentiality, Integrity and Availability
IT Fundamentals: Password Safety
IT Fundamentals: Data Handling
IT Fundamentals: Email Essentials
IT Fundamentals: Internet Security
Anti-Bribery & Corruption Training (Global)
GDPR Executive Guidelines
GDPR for Personal Data Handlers
Staff Awareness Services
Central Government and IT Security Compliance
Engineering and Manufacturing
Healthcare: The IT Assurance Challenge
Local Government and IT Governance
Compliance Aware Posters
Take A Tour
What is MetaPhish?
Cyber Security & Compliance eLearning Library88
Policy Management Software
Generating Change through People
Chelmsford Borough Council Generating Change Through People Case Study
JD Williams Case Study
Essex Online Partnership
Mater Private Hospital
Derry City Council
Chelmsford Borough Council Blended User Awareness Strategy Case Study
Dublin Dental School
The City of London Police Case Study
Angus Council - A Case Study
Belfast Metropolitan College
Proper Policy Management and User Awareness requires Corporate Courage
Do Porn Stars have the right to Privacy too?
Is there such a thing as “Worry Free Compliance”?
Data Privacy: a new religion for the digital information era?
The times they are a changing….
Ask Idris…why does Local Government need Policy Management Software?
Key Considerations for your Password Policy.
5 Steps to Secure Mobile Devices and Mitigate Risk to your Organisation.
UK Channel clearly interested in Policy Management Software.
Policy Communication, how News Corporation got it wrong.
The ICO: Helping You Comply; On Your Case if You Don’t.
The 7 Golden Rules for Sharing Government Information
5 Rules of Policy Management; Tackling the FEAR of User Behaviour.
Charities: how do you avoid the Reputational Damage a Data Breach would entail?
Is the IT Department the Achilles heel of your IT Security?
The Importance of Training and Awareness for Information Security
5 Reasons Why User Awareness is the Next Big Thing in the Channel
A Human Firewall, what a way to deal with IT Security and Data Protection
Employees: the First Line of Defence.
Infosec Awareness…begins at home.
“Solicitor, you should know better!” – Policy Management and Data Protection awareness in the professional services industry.
User Awareness and Policy Management key to dealing with proposed changes to EU Data Protection Law.
The two major determinants of a successful Governance, Risk and Compliance (GRC) Project.
Compliance Project Branding – A key asset for delivering user awareness of Information Security and Privacy campaigns.
Is hindsight better than foresight? How taking a reactive approach to GRC is not always the best.
Ensuring Compliance in times of growth.
Cloud based GRC Software MyCompliance Double Finalist in UK IT Industry Awards.
Relate Corporate Data Protection needs to employees personal use of technology
ICO Fines : Can the NHS afford to take the risk?
Learning technologies opening new horizons for employee awareness
Staff Induction Process-The Opportunity to Make a Lasting Impression
When is a ‘kickback’ not a ‘kickback?’
If you could hack into anyone’s email account, who would you choose?
Unifying Security through Policy Management and eLearning
Should Organisations within the Private Sector have to declare a Data Breach?
Will the Barclays data loss become the tipping point for Information Governance within the Financial Service Industry?
Planning for data breaches is one way to ensure they do not happen.
Will everyone use Social Media in ten years time?
How we can reduce the risk of data breach within the retail sector through campaigns?
Mirror, Mirror on the wall, are passwords the fairest weakness of all?
Do you smell something Phishy with your emails this Christmas.
Is there a data breach monster lurking in the shadows of your organisation?
Are Staff Policies the "Mom and Apple Pie" of Cyber Security
Investing in security awareness to safeguard against attacks
The Era of Preventative Self-Policing
Educating Your Employees: Using Continuous Compliance Training to nurture a Compliance Culture
The ten essential steps to protect against ID fraud
The 5 essential elements of Continuous Monitoring (and why it matters)
Are organisations wasting their time trying to change Human Behaviour?
Rolls Royce Staff on the Front line of Anti-Bribery mitigation
Urging Middle Management and Executives to Carry the Compliance Message
Transparency and Integrity in the FAI: Leading your organisation by example
Security breaches directly or indirectly caused by insiders are becoming more common
Lessons to learn from the Ashley Madison Data Breach
Information Security: Culture and Change
Ashley Madison is plain old BLACKMAIL - Insider Fraud
Reports have revealed a worryingly high number of data breaches from councils.
Never mind your staff, what about your third party risk?
“No Biggie” states Clinton. Could lack of Cyber Security Awareness cost the Presidency?
Phishing exploits use big global IT events such as the Windows 10 Launch to mask their evil
TalkTalk Data Breach puts CEO in Hot Seat
How Information Governance will change post TalkTalk
Developing a security culture is not complicated or complex.
Data security? you're doing it wrong.
On the first day of Christmas… Fraudsters are waiting on you!
On the second day of Christmas…You're a fraudsters dream come true!
On the third day of Christmas…You gave you're personal data to me!
On the fourth day of Christmas… You thought before you clicked
On the fifth day of Christmas… You doge that charity scam
On the sixth day of Christmas… Cyber Criminals are still targeting you
On the seventh day of Christmas… Online scams are all but true
On the eighth day of Christmas… An "e-Card" came to you
On the ninth day of Christmas… A SMiShing scam finds you
On the tenth day of Christmas… Stop and think, what would my IT Manger do?
On the eleventh day of Christmas… Don't send money transfers through!
The 12 cons of Christmas
The BREACH Awakens
It’s the most wonderful time of the year for Cyber Security
Cyber Security Resolutions for 2016.
How your organisation can improve cyber security in 2016?
Are there now three certainties in life: death, taxes and phishing attacks?
Data Protection Day 2016- "If you collect it then you must protect it".
Many cases of stolen information occur from a hacker basically guessing a victim’s password?
Are you playing your part for a better internet?
Attackers Target Hospital with Malware, Demand $3.6 Million in Ransom
Data Dump Exposes Hundreds of Spotify Premium Account Credentials
Utah State Computer Systems See Upwards of 300M Hacking Attempts a Day Thanks to NSA Data Center
IRS Reports 400% Surge in Tax-Related Phishing and Malware Attacks
Data Breaches Compromised 708 Million Records in 2015
Man Receives 10 Years in Prison for Hacking, Online Stalking
Hacker to Be Punished for Targeted Attack Against Moonpig
Ottawa Hospital Computers Targeted in Ransomware Attack
Attackers Pretended to Be FinCERT in Phishing Campaign Targeting Russian Banks
Researcher Creates Tool that Can Help Detect Crypto-Ransomware
Security and Policing: Why User Awareness Makes a Difference in Law Enforcement
FBI Cracks Suspected Terrorist's iPhone without Apple's Help
Ransomware Closes Genealogy Service at the National Records of Scotland
Trump Hotel Possibly Hit by Another Credit Card Breach
Italian Government Revokes Hacking Team's License to Export Spyware
Number of Zero-Day Vulnerabilities Discovered in 2015 Sets All-Time Record
Man Faces 10 Years in Prison for DDoS Attack against Security Researcher
Think twice before you click that link! Always remember- common sense is the best defence!
Bill Gates: U.S. Gov't Should Search Companies' Emails Only in "Extraordinary" Circumstances
Opera Becomes First Major Web Browser to Offer Free, Built-in VPN
Armada Collective Posers Use Empty DDoS Threats to Extort $100,000 from Victims
Phishing Attacks Continue to Trend Upward, Reveals 2016 Verizon DBIR
Russian Malware Author Ordered by Court to Pay $6.9 Million
The Importance of Top-Level Buy-In for Cultivating Security Awareness
London Sexual Health Clinic Fined £180,000 for Data Breach
Ex-U.S. Military Contractor Receives 6 Months House Arrest for Copying Classified Files
Symantec Patches Remote Code Execution Vulnerability in Antivirus Engine
UK Banks Ordered to Update Information Security Measures Following SWIFT Heist
SWIFT to Launch New Security Program Following Bank Heists
WWII & Modern Day Cyber Security
Microsoft Reveals Plans to Ban Common Passwords to Protect Azure AD User Accounts
Hackers Stole 65 Million Tumblr Email Addresses and Passwords
FBI Warns Users to Watch Out for Extortion Emails in the Wake of Data Breaches
Phishers Target Victims of Mt. Gox Bankruptcy with Malware
Morgan Stanley Agrees to Pay $1 Million for Failure to Protect Client Data
Let's Encrypt Apologizes for Inadvertent Email Address Disclosure
Alleged Hacker Claims Responsibility for DNC Hack, Releases Documents
Phishers Leveraged Claim of Virus in Apple's iTunes Database to Target Users
IRS Removes e-File PIN Tool Due to Automated Attacks
419 Scam Uses Historic Lottery Win to Trick Recipients into Handing Over Personal Data
Identity Fraud Up 57 as Thieves Prowl Social Media for Unsuspecting Users
Be The Change. #1
How Corruption Hinders Economic Growth and What Companies Can Do to Help Stop It
An Inside Look into How to Achieve ISO 27001 Certification
Sophisticated Malware Capable of Damaging European Energy Sector
Delilah Trojan Actively Seeks to Recruit Insiders at Target Organisations
People Still at Risk of Revealing Personal Details via Unsecure IoT Devices
On the Hook: Ransomware and the Evolution of a Phishing Attack
Denmark Accidentally Delivered 5.3M Citizens' Healthcare Data to Chinese Agency
Patch Released for SQL Injection Vulnerability in Booking Calendar WordPress Plugin
The Board-Level Barricade. #2
UK Web Hosting Provider Suffers Large DDoS Attack
Researcher Social Engineers Tech Support Scammer into Installing Locky Ransomware
10 IT Security Risks Your Employees Bring to Your Organization
Hackers Breach Dota 2 Dev Forum, Make Off with 2M Users' Information
Two remote workers in an airport. What’s the worst that could happen?
280 Customers of Payroll Software Company Receive Notice of Data Breach
Half of Organisations Had Trouble Securing Executive Buy-in for ISO 27001, Reveals Survey
9 Tips for Spotting a Phish
Phishers Leveraging Malicious Domains via Google AdWords to Steal Users' Credentials
UK University Suffered 21 Ransomware Attacks in the Past Year, Find Researchers
ICO Examines Virgin Trains' Decision to Publish CCTV Footage of Labour Party Leader
OneLogin Confirms Bug Allowed Hacker to View Users' Encrypted Secure Notes
Communication is Key!! #3
Hitsniffer Databases Stolen, Abused by Rival Company to Steal Away Customers
Business Email Compromise Scam Loses Company One Million Dollars
Seagate Sued by Employees Whose PII Was Leaked in Phishing Attack
8 Data Breaches Caused by Human Error
10 Ways to Protect Yourself Against Phishing Attacks
2.2 Million ClixSense Users' Account Details, Personal Information Published Online
Wall Street Technology Firm Sued by Former Client for Losing $6M in Email Scam
Cyber Highway Aims to Put UK Orgs on the Road to Cyber Essentials Certification
Accelerator Facility Will Help Develop New Generation of UK Cyber Security Systems
Brad Pitt Death Hoax Making the Rounds on Social Media
5 Steps Towards Online Safety with National Cyber Security Awareness Month
Amazon Issues E-mail Alert Warning Some Customers about Data Leak
Be Cyber Secure During 9-5 And Beyond!
Most UK Citizens Not Confident Their Government Can Keep Their Data Safe
5 Tips on How to Create a Security Culture for ECSM 2016
Credit Union Tells Customers Their Cards Won't Work at Wendy's Restaurants
Internet: Friend or Foe? The top 10 things you should never do online
5 Types of Cybercrime and How to Protect Against Them
We need to TalkTalk about security breaches
5 Ways to Protect Yourself Against Mobile Malware
Myth #1: The best (technical) defense is a good (cyber) offense
Baystate Warns 13,000 Patients of Breach Following Phishing Attack
Myth #2: I don’t work in IT so cyber security doesn't apply to me
Myth #3 - Infected computers will display aggressive, nasty messages and make your computer run slow
Understanding the Growing Threat of Digital Attacks Against National Infrastructure
Computer Virus Infection Forces Hospital to Cancel All Operations and Appointments
5 things you wanted to know about GDPR but were afraid to ask!
Sephora: The Beauty and the Data Breach
Phishing Terminology You Need To Know
14 Arrested for Using Banking Malware to Launder £11 Million from UK Banks
Generating Change Through People and Making It Stick!
Tesco Refunds £2.5M to 9,000 Customers Following "Sophisticated Attack"
5 Things Companies Need To Know About GDPR
Back to Basics #1: Phishing Threats
New Ransomware Customizes Ransom Note with Victims' Pictures and Data
Brexit / GDPR - Keep Calm and Carry On? #1
Extradition Order for Hacker Lauri Love Signed by UK Home Secretary
Brexit / GDPR - Keep Calm and Carry On? #2
5 Ways Employees Can Safeguard Cardholder Data
More Than 130,000 Customers' Data Stolen in Three UK Breach
Shopping On Black Friday: Are You Aware Of The Dangers?
Attackers Reused Passwords to Place Fraudulent Deliveroo Food Orders
Passwords: What You Need To Know
Wi-Fi Awareness: To Surf Or Not To Surf?
Scammers Distributing Backdoor-Laden Phishing Templates on YouTube
26,500 National Lottery Player Accounts Believed to Have Been Compromised by Hackers
What Are You Saving For This Christmas? I Bet It’s Not For Ransomware!
5 Hacking Methods You Weren't Even Aware Of
Criminals Can Guess Visa Members' Card Data Using Distributed Attack
Can Ransomware Really Ruin Your Christmas Party?
Data Security and Digital Security Incidents Increased in Q2 2016, Reports ICO
Ways To Protect Yourself From The Phisherman This Christmas.
"Love," "Star," and "Girl" the Most Common Words Used in Leaked Passwords, Reveals Study
Why You Need To Phish Your Employees (1)
Fake Credit Card Email Uses Malicious Macros to Download Cerber Ransomware
55,000 Lynda.com Users' Passwords Breached by Unauthorized Third-Party
Man Sentenced to Five Years in Prison for Stealing Nearly £1M Using Banking Malware
Android Ransomware Infects Smart TV on Christmas Day
Malware Authors Develop Amateurish Threats Based on Mr. Robot
So called ‘rebels’ attempt hack on our internal EvilServers®
Computer Criminals Cold-Call UK Schools to Deliver Ransomware
Siblings Arrested for Hacking High-Profile Italian Targets
Phishing Attack Immediately Compromises Victims' Gmail Accounts
WhatsApp Scam Uses Fake Coupons to Collect User Info, Generate PPI Affiliate Fees
UK Saw Record Number of Dating Fraud Cases in 2016
Fake WordPress Plugin Redirects Mobile Visitors to Porn Sites
5 Common Mistakes Companies Make with Security Policy Management
Georgia Man Charged with E-mail Spoofing Scheme that Cost County $566K
Phishing Campaigns Using Same Domain to Retrieve Sage or Locky Ransomware Payload
Macro-Based Malware Adopts Donald Trump Theme to Target Mac Users
More than 90 Percent of All Phishing Attacks Targeted Just Five Industries in 2016, Finds Report
Happy Valentine's Day from your computer
188 Digital Attacks that "Threatened National Security" Struck UK Over Three Months
Computer Security Thought Leader List Signs that Your Child May Be a Hacker
Hundreds of Websites Defaced by Hackers Who Hijacked Web-Hosting Server
Rogue IT Admin Argues He Was Authorized to Trash Former Employer's Systems
Have you changed your password recently?
Ransomware: Would You Know To Unplug?
GDPR Fines and Penalties: Big businesses that paid a big price
Keep Your Mum Safe Online This Mother’s Day
GDPR and Brexit – What will it mean for you?
5 things you should NEVER post on social media
Mind Hacking – Cyber Threat of the Future?
GDPR and Brexit – it does affect you!
The Evolution of Ransomware
The Art of The Phish
Beware of fraud this bank holiday
Cyber Criminals Create Chaos in Hollywood
Foyle Search and Rescue - Charity of the year
What’s the difference between GDPR and the data protection directive?
5 challenges you will face with your GDPR project
NHS Cyber Attack - Everything you need to know
GDPR - 12 things you need to do in 12 months
The first 3 steps to GDPR success
3 biggest security mistakes made at the office
Students - Don't forget to back up!
6 tips on getting stakeholder buy in for your GDPR project
Father’s Day Tech Gadgets- Friend or Foe?
10 tips for cyber safety at work
Is the Connected Car the next Cyber Target?
Holiday scams - what to look out for
Petya – The latest in a series of high-profile cyber attacks
Accountability: The core of GDPR success
Top 5 Cyber Security Threats to be aware of in 2017
3 things you need to know about the data protection directive
3 reasons why your employees need IT security awareness training
How to spot a phishing scam
Get fit, but don’t get hacked!
10 reasons why you’d love working for MetaCompliance
Ransomware Attacks - Do's and Don'ts
General Data Protection Regulation – What does it mean for employers?
Paving the Way for the Future with One Direction
Phishing Attacks - 5 Ways to Protect Your Business
HBO – The Latest TV Network to Suffer a Cyber Breach
Cyber Governance Health Check Report 2017 – The Lowdown
GDPR – What Does it Mean for the Corporate Counsel and Legal Department?
Hurricane Harvey and the Phishing Targets
Cyber Security eLearning: The difference between regular and MetaCompliance = employee engagement!
International Day of Charity
Policy Management Systems – Picking the Right One
Cyber Security - 3 Tips for Students
What is spear phishing and how to avoid it
Phishing Test for Employees – Why its Important
GDPR for Dummies – 5 Reasons to Download
5 top tips to help keep older persons safe online
Going Viral: Why Avril Lavigne is the Biggest Threat in the Cyber Sphere
What is a Ransomware email? 5 tips for how to detect one
Netflix – Scam of the Week
European Cyber Security Month – Week One: Cyber Security in the Workplace
Data Breaches – Why 2017 Has Been a Landmark Year
European Cyber Security Month – Week Two: Governance, Privacy & Data Protection
FreeMilk - Scam of the Week
GDPR: 4 Things Marketers Can Do to Avoid a Fright
European Cyber Security Month – Week Three: Cyber Safety in the Connected Household
Scam of the Week – DoubleLocker Android Ransomware
Trick or Treat: Why CCleaner may not be all it seems!
Scam of the Week – Locky Ransomware
[INFOGRAPHIC] Freaky Cyber Facts for Halloween
Scam of the Week – BadRabbit
Access Control (and Why Everything You Know About It is a Lie)
Scam of the Week – Fake WhatsApp
The Ugly Truth about Cyber Bullying
Christmas Shopping: Staying Safe Online Over the Festive Period
Scam of the Week - Netflix
Black Friday (and How to Avoid Shopping Scams During the Shopping Holiday)
5 Things You May Not Know About GDPR
4 Cyber Security Trends to Watch Out for in 2018
Scam of the Week - NiceHash Bitcoin Heist
Article 30 and its Importance to Your GDPR Project
GDPR for Dummies: The Roadshow
Internet of Things (IoT): Securing Your New Gizmos This Christmas
Merry Christmas and a Happy New Year from MetaCompliance
4 Cyber Security Resolutions for the New Year
5 Reasons Why You Should Attend the GDPR Roadshow
Scam of the Week – Meltdown and Spectre
Cyber Security eLearning: Why go Nano?
Scam of the Week - Infected Memory Sticks
Scam of the Week – WhatsApp
Data Privacy Day
The GDPR Dream Team
Scam of the Week – Android gets hit with RedDrop
Scam of the Week - Thanatos (1)
The best gift for Mother’s Day is keeping your mum safe online
I got 99 Problems But a Phish Ain't One!
Meet the latest Compliancers #1
Leading Food Supplier Mitigates Compliance Risk with Policy Management Software
Newcastle-Under-Lyme County Council Adopts Compliance Management System
Top Law Firm Harper Macleod Adopt Policy Management Software to improve Risk Management Framework.
RSA Insurance extends its use of MetaCompliance Policy Management software within their organization.
MetaLearning Heralds a new way to Increase Adoption Rates of e-Learning Content Among Employees and 3rd Parties
UK leader in policy management, have been successfully accepted as a supplier on the new and updated G-Cloud iii framework.
Top Legal Firm adopts policy management software to improve Information Security
Advantage 2013™ Policy Management System launched at InfoSecurity Europe 2013
Wycombe District Council attaining data protection compliance with Policy Management system
Policy Management Finalist in the Network Computing Awards
Gloucestershire County Council implements Policy System to Ensure Policy Compliance and Protect Customer Data
MetaCompliance Advantage Receives Official Microsoft Certification for Windows 8
Policy Management Software available on G-Cloud 11 Framework
London Borough of Redbridge adopt Policy Management Software to improve Information Security awareness
Regulatory Risk Mitigation Solution selected as Finalist for UK IT Awards 2012
Blaenau Gwent County Borough Council adopt innovative User Awareness Software
The Northern Ireland Guardian Ad Litem Agency Adopts Metacompliance Policy Management Software to Aid Secure Information Sharing
AGE UK adopts Policy Management Software and Demonstrates Commitment to Protecting Their Customer Information
London Borough of Lambeth Automates Policy Communications to Comply With Mandatory Information Security Training Legislation
New Cloud based Policy Management Software Incorporating Mobile User Access Showcased at InfoSec 2012
Citywire Choose top Ranking MetaCompliance Policy Management Software
Policy Management Software Adopted at London Borough of Merton to Comply with Data Protection Legislation
UK Policy Management Software Company Achieves Top Ranking in Global GRC Report
Policy Management Tool Key to Complying with Data Protection and CoCo Regulation for Somerset County Council
Alzheimer's Society Adopt Proactive Approach to Policy Management and Data Protection
University of Oxford NPEU Choose MetaCompliance to meet Compliance Objectives
Metacompliance Announce new Channel partnership with Bridgeway Security Solutions
Eurotek Networking Partner with Metacompliance
MetaCompliance Infosec 2011 Networking Lunch
West Middlesex University Hospital Trust Chose MetaCompliance to Comply With Information Governance Regulations
Twitter Competition - Win a Kindle 3G at Infosecurity Europe
Healthcare: 3 Myths of Data Protection
Gareth Jones from Cherwell District Council talks to Computing about MetaCompliance and GCSx
JD Williams Selects MetaCompliance to Ensure PCI DSS Policy Compliance
NHS Health Scotland Selects MetaCompliance Advantage to Comply with Information Governance standards
Data security and the user by Paul Lewis IT Development Manager at Caerphilly County Borough Council
MetaCompliance showcased at Public Sector Enterprise ICT 2010
Colchester Borough Council: Securing Information Assurance with Automated Policy Management
Company Rebrand to Focus on MetaCompliance Growth.
Caerphilly County Borough Council: Securing Information Assurance with MetaCompliance Advantage
User awareness a key issue at InfoSecurity 2010
Chelmsford Borough Council: Guaranteeing IT Assurance with MetaCompliance Advantage
London Borough of Bexley: Securing IT Assurance with MetaCompliance Advantage
Scotland Leading the way for IT Assurance
Metacompliance Future Proofs IT Assurance by Earning the Windows 7 Logo
Metacompliance: Supporting IT Assurance at the 5th Annual WARP Forum
IT Assurance: Tackling the User Awareness Challenge at Merthyr Tydfil Council
MetaCompliance delivers Information Assurance to ISfL
Harlow Council: Delivering IT Assurance with MetaCompliance® Advantage
InfoSec 2009: MetaCompliance Advantage Launch Addresses User Accountability and Awareness Challenges
Local Authorities raise awareness of CoCo with MetaCompliance Advantage
Leading lights in IT Security join forces to deliver employee accountability in the European arena
Metacompliance experts host PCI Knowledge Base Guest Seminar Series
BreconRidge: Delivering Global IT Governance with MetaCompliance
Delivering real organisational change to meet the needs of ISO27001
User awareness is key to avoiding information security failures
Best Practice IT Security showcased at Gartner Summit
Canadian PCI DSS Compliance market supported by I.T Security Partnership
Atlas Capital Demonstrate Compliance Best Practice with Intelligent Policy Management Solution
FSA Fines Norwich Union Life £1.26m for Slack Security Policies
IT GRC- Governance, Risk and Compliance Automation delivered with MetaCompliance Enterprise 2.0
Metacompliance Announces First South African Gold Level MetaPartner
MetaCompliance Enterprise 3.0 Helps Organisations Combat Security Breaches
85% of PCI DSS Compliance is Policies and Procedures.
Why write PCI DSS and ISO27001 Policies?
5 Steps to Managing PCI DSS Updates
Travelex enhances PCI DSS Compliance with Self Certification solution
PCI Compliance – The Golden Rules of User Awareness
Royal Sun Alliance: Meeting the IT Compliance Challenge Head On
User Awareness: A Bridge too Far for the Public Sector?
Privacy watchdog calls on CEOs to take responsibility for data protection safeguards
City of London Police Automate Staff Policies and Procedures
Policy Management and User Training Delivers Value to Large NHS Trust
Policy Management Software on G-Cloud 5 Platform
Packaging Multinational Implements Enterprise Policy Management Solution to Manage Multiple Regulatory Environments
Britain's Biggest High Street Insurance Broker Deploys Compliance Software to Underpin Employee Awareness
Policy Management Software key for AAT the Leading UK Qualification and Membership Body
Data Protection and the Law: ‘Securing the Law Firm’ Conference
Community Interest Company, Provide UK, ensures best practice Information Governance with Policy Management Software
MetaCompliance Sponsors Charity Event for Children in Crossfire
MetaCompliance Policy Management Software Awarded a Place upon Latest G-Cloud 6 Framework
City of York Council adopt Policy Management System to improve Cyber Security Awareness
New Microsoft SharePoint Integration brings agile Compliance to the Enterprise
Policy Management software improves cyber security culture at Walsall
Leading London University invests in Policy Management Software to underpin staff participation and awareness
Metacompliance, Policy Management and Staff Training Software Company support regional charity.
Dentons Ensures Best Practice Policy Management Process
East Devon Councils invest in "best in class" Policy Management Software
Policy Management for IT Security and Compliance - Important for Education Services
Key Security Policy Development plays a major role in corporate governance.
Direct Rail Services Underpin Compliance Processes With Staff Education of Key Policies
Policy Management Software awarded place on procurement framework G-Cloud 7 via Digital Market Place.
Top London University addresses Cyber Security awareness.
Intergraph® Process, Power & Marine Deploys Policy Management System for Cloud service
Eating your own dog food! Metacompliance achieves ISO 27001 certification
MetaCompliance has been honoured as finalists of the Innovative Product of the Year for the 2016 Cyber Security Awards.
MetaCompliance Cloud based Cyber product shortlisted for 2016 Cyber Security Awards
Cyber Security Education Specialist wins industry award for most innovative cloud product at the annual Cyber Security Awards 2016.
Welsh Ambulance streamline Compliance Processes with Policy Management System
Leading Law firm improves ISO27001 Policy Management
MetaPhish – 2016 Finalist for “Anti-Phishing Solution of the Year”
Phishing and ISO27001 eLearning shortlisted in Industry awards
Cloud Software provides solution for 2018 GDPR regulation
IAPP hosts GDPR project implementation webinar
MetaCompliance nominated for two Cloud Excellence Awards
MetaCompliance Listed on Cardin Partners’ SaaS Quick 25
MetaCompliance Named Most Innovative UK Tech Firm
MetaCompliance nominated for two UTV Business Eye Awards
MetaCompliance at Cyber Security Summit 2017
MetaCompliance plans to double Derry~Londonderry workforce
MetaCompliance Win Prestigious Security Excellence Awards
MetaCompliance Bring GDPR for Dummies Roadshow to a European City Near You
MetaCompliance Brings ‘GDPR for Dummies’ Roadshow to Edinburgh
MetaCompliance will once more exhibit at InfoSecurity Europe
iNetwork Information Security Annual Conference
Infosecurity Europe 2015
e-Crime and Information Security Mid-Year Meeting
Secure South West
Metacompliance Annual User Event
Kingdom e-Government Summit, Saudi Arabia
WEBINAR - “Delivering real organisational change to meet the needs of ISO27001”
E-Crime & Information Security Congress March 2014
Info-Crime Summit 18th & 19th February 2014
Hardening the Human Firewall - The Key Elements of a User Awareness Programme
4th Annual Healthcare IT Exchange – 2013
Charity IT Leaders Annual Conference
People vs. Compliance - MetaCompliance Annual User Event - 17th Sept 2013
National Information Security Conference 2013
Digital 2013 - The Key Information Technology event for Wales
Infosecurity Europe 2013
The 8th edition of the Corporate Counsel & Corporate Compliance Exchange
Fairwarning / Metacompliance NHS Information Governance Event
MetaCompliance Infosec11 Networking Lunch
Healthcare: 3 Myths of Data Protection
User Awareness a key issue at InfoSecurity 2010
Metacompliance: Supporting IT Assurance at the 5th Annual WARP Forum
WEBINAR - Compliance Awareness and Policy Management - Implementing Best Practices
Metacompliance experts host PCI Knowledge Base Guest Seminar Series
Securing the Law Firm 2015
MetaCompliance exhibiting at the 2015 iNetwork Information Security Conference in Manchester, UK.
PCI Compliance – The Golden Rules of User Awareness
Best Practice IT Security showcased at Gartner Summit
MetaCompliance Attend Corporate Counsel & Compliance Exchange 2015
WEBINAR – Once a policy is written, how do you engage employees?
WEBINAR - Trick or Treat: Could lack of staff education lead to an Information Security nightmare?
Infosecurity Europe 2016
THE UK’S PREMIER SECURITY AND LAW ENFORCEMENT EVENT 08 – 10 MARCH 2016
iNetwork Event “Building Cyber Security and Resilience in a Digital World”
MetaCompliance Attend Corporate Counsel & Compliance Exchange 2016
Europe's leading Phishing and eLearning vendor to speak at prestigious Cyber Security Summit in London on 22nd June 2016.
MetaCompliance will be attending the annual Corporate Counsel Exchange event taking place from 10th – 12nd October 2016 in Germany.
MetaCompliance will attend the next Cyber Security Exchange event from 31st Jan – 1st Feb
MetaCompliance to attend Corporate Counsel Exchange event in April 2017
Webinar- Practical guidance for implementing GDPR in your organisation
InfoSecurity Europe June 2017
MetaCompliance to Attend Corporate Counsel Exchange in Munich
Webinar: Policies - Cornerstone of Privacy, Compliance and Information Security Management
MetaCompliance will attend the Cyber Security Summit
GDPR for Dummies European Roadshow - London, The Soho Hotel (23/01/2018)
GDPR for Dummies European Roadshow- Edinburgh, Hilton Carlton (24/01/2018)
GDPR for Dummies European Roadshow - Dublin, The Spencer Hotel (30/01/2018)
GDPR for Dummies European Roadshow - Belfast, Hilton Hotel (31/01/2018)
GDPR for Dummies European Roadshow - Manchester, St James Club (01/02/2018)
GDPR for Dummies European Roadshow- Berlin, Scandic Hotel (20/02/2018)
GDPR for Dummies European Roadshow- Berlin, Scandic Hotel (20/02/2018) (1)
Commercial Terms and Conditions
MetaCompliance® Copyright,© 2017. All Rights Reserved. |
Scroll to Top