Important information on cookies

This website uses cookies to store information, if you do not agree with this please leave this website now.

To read more about our cookie policy please click here.

Accept cookies


Cyber Security Challenges

Human Behaviour

Protect your people from bad decisions. Cyber security cannot ignore human behaviour.

Regulatory Requirements

Solutions across industry verticals and geographical regions.


It takes years to build a reputation… and a matter of seconds to destroy it.

Business Continuity

The ability to change effectively and operate efficiently.


Don’t let your IT initiatives fail. Reveal and profit from the value of IT.

Operations & Infrastructure

Increase efficiency and prepare for long term competitiveness.

Third Parties

A healthy relationship requires hard work and commitment.

Incident Response

Expert business recovery – Rapid identification. Coordinated containment. Business recovery.



Cliche (2)

Shell-shocked Vulnerability: Who is affected and what they should do

A vulnerability (CVE-2014-6271) has been identified which enables remote access to be granted to any device which uses a bash shell. Many will assume that this vulnerability will only affect local device interaction on a system. However, bash is used across widespread applications, including Apache, and all devices which run a Linux kernel, and as such, is highly likely to impact a significant portion of the corporate environment.

Read more »


IRM helps cyber talent fight online crime at military training camp

On Thursday 28th August a number of IRM’s technical security consultants will be walking candidates through a cyber security testing simulation at the Cyber Security Challenge’s new cyber camp, hosted at the Defence Academy in Shrivenham

Read more »


In the blog

Blog shredded

Changing EU Data Protection Regulation

It is anticipated that after months of wrangling the revisions to the European Union (EU) Data Protection Regulations (DPR) will be ratified towards the end of this year, or early next, and that they will be brought into force and integrated into National Data Protection legislation shortly thereafter.

Read more »