top of page
Search


ETSI EN 304 223: a practical baseline for securing AI across its lifecycle
Image of an artificial intelligence head showing neural network links AI security has stopped being a niche concern. The threats are real, they’re evolving quickly, and they look different to “traditional” application security: data poisoning, model manipulation, indirect prompt injection, and the operational realities of deploying models at scale all change the risk picture. ( techuk.org ) That’s why ETSI’s EN 304 223 matters. It’s a baseline set of cyber security requiremen
Rachel Gentry
5 days ago5 min read


Unlocking Growth: The Top Fractional CISO Benefits for Your Business
In today’s fast-paced digital world, security isn’t just a nice-to-have; it’s a must-have. But hiring a full-time Chief Information Security Officer (CISO) can be costly and sometimes unnecessary for many businesses. That’s where the concept of a fractional CISO comes in. Imagine having expert security leadership on your team, but only when you need it. Sounds like a win-win, right? Let’s dive into the fractional CISO benefits and why this approach is transforming how busine
Rachel Gentry
Jan 53 min read


Ensuring Safe AI: An Insight into Microsoft Foundry Content Safety Tools by Rachel at RTG Commercial Services Ltd
Artificial intelligence is transforming industries, but with great power comes great responsibility. As AI tools become more integrated into business operations, ensuring their safe and responsible use is critical. At RTG Commercial Services Ltd, where I lead efforts in information and cyber security, we understand the challenges and opportunities AI presents. Today, I want to share insights into Microsoft Foundry’s content safety tools and how they help organisations protect
Rachel Gentry
Dec 30, 20253 min read


Inspiring Examples of Security Projects for Businesses
When it comes to protecting your business, security is not just a checkbox on a compliance form. It’s a dynamic, ongoing journey that demands creativity, commitment, and smart investment. You might be wondering: What kind of security projects can truly make a difference? How can you balance the need for robust protection with the realities of busy schedules and limited resources? Let’s dive into some examples of security projects that can transform your organisation’s approa
Rachel Gentry
Dec 23, 20253 min read


Professional Information Security Guidance for Businesses: Your Ultimate Roadmap
In today’s fast-paced digital world, safeguarding your business’s data isn’t just a nice-to-have – it’s an absolute must. But where do you start? How do you balance robust security with the need to keep operations smooth and efficient? If you’re ready to invest in your company’s future, I’m here to walk you through the essentials of professional information security guidance. Together, we’ll explore practical steps, smart strategies, and compliance must-dos that will empower
Rachel Gentry
Dec 19, 20254 min read


Essential Cybersecurity Strategies for UK Enterprises
In our digital world, protecting your business from cyber threats is no longer optional. It’s a necessity. Whether you’re a growing scale-up or a global enterprise, the stakes are high. Cyber attacks can disrupt operations, damage reputations, and lead to costly compliance failures. But here’s the good news: with the right strategies, you can turn cybersecurity from a headache into a competitive advantage. Ready to dive in? Let’s explore essential business cybersecurity strat
Rachel Gentry
Dec 9, 20254 min read


Using Videos to build Information Security
In today’s fast-paced digital world, staying ahead of cyber threats is not just smart - it’s essential. But who has the time to sift through endless manuals or attend lengthy seminars? That’s where engaging security video guides come in. They offer a dynamic, accessible way to grasp complex information security concepts quickly and effectively. Ready to dive in? Let’s explore how these video guides can transform your approach to safeguarding your business. Why Security Video
Rachel Gentry
Dec 1, 20254 min read


Essential Cyber Security Protection for Businesses
In today’s fast-paced digital world, cyber threats are no longer a distant worry – they are a clear and present danger. If you’re steering a business towards growth and compliance, you already know that safeguarding your digital assets is non-negotiable. But how do you cut through the noise and focus on what truly matters? Let’s dive into essential cyber protection strategies that will empower your business to thrive securely. Why Cyber Protection for Businesses Is a Game-Cha
Rachel Gentry
Nov 21, 20254 min read


Cybersecurity Awareness Month: Waning Momentum as Threats Escalate
Cybersecurity Awareness Month, once a rallying point for British organisations, is now losing its momentum just as cyber attacks grow in scale and sophistication. The recent, high-impact breaches at Jaguar Land Rover and Marks & Spencer lay bare the urgent need for smarter, continuous resilience —well beyond the annual awareness push. Why Is The Momentum Fading? Participation in Cybersecurity Awareness Month is on the decline. It is being replaced by “tick-box” compliance mea
Rachel Gentry
Oct 27, 20253 min read


Information Security is a leadership imperative
Consistent, risk-aligned security is not just a technical concern—it's a business imperative for senior leaders. By anchoring security strategy in business context, risk and controls frameworks, and ongoing assurance, leaders protect value, ensure compliance, and reinforce organisational resilience. Why Senior Leadership Should Drive This Approach For those with the remit to influence at board level, a structured security programme provides several compelling benefits: Strong
Rachel Gentry
Sep 24, 20253 min read


Navigating the EU AI Act – What UK and EU Businesses Must Do Now in AI and Security
The EU AI Act: Your Roadmap to Responsible AI Compliance The EU AI Act, which came into effect in August 2024, is a transformative piece of legislation. It positions Europe at the forefront of trustworthy, responsible artificial intelligence. For businesses operating across the UK and EU, this Act isn’t just red tape—it’s your roadmap for creating successful AI systems. AI and security are the keys to earning user trust, avoiding eye-watering fines, and opening new markets. W
Rachel Gentry
Aug 4, 20253 min read
ISO 27001, SOC 2 Type 2, NIST & SOX IT General Controls: What’s the Difference (and What’s the Same)?
If you’re a business leader trying to make sense of the alphabet soup of security standards - ISO 27001, SOC 2 Type 2, NIST, and SOX IT...
Rachel Gentry
Jul 10, 20252 min read


The Supply Chain Security Crisis: Why UK Organisations Must Act Now
Rachel Gentry, Managing Director of RTG Commercial Services Ltd The reality facing UK businesses is stark: nearly half of all...
Rachel Gentry
Jun 4, 20254 min read


Key considerations to maximise your Return on Investment from ISO27001 security certification
Many companies plan to achieve ISO27001 or SOC2 certification to attract new clients and secure competitive advantage, but achieving and...
Rachel Gentry
May 5, 20253 min read


Do I need ISO27001, NIST, SOC2 or CIS for my security framework?
Do your research first When considering information security management systems (ISMS), organisations often ponder whether obtaining ISO...
Rachel Gentry
Apr 4, 20253 min read


How Much Does It Cost to Get ISO27001 with us?
Rachel Gentry: Founder & Managing Director ISO 27001 certification is a big step for any business wanting to prove its commitment to...
Rachel Gentry
Mar 17, 20253 min read


How I Help Business Founders Unlock the Full Potential of Information Security
For many business founders, the journey with information security starts as a reactive measure — meeting compliance requirements to avoid penalties or breaches. But it doesn’t have to stop there. I work closely with founders to go beyond initial compliance, helping them unlock the quality and value of information security across all aspects of their business. Step 1: Understanding Your Business Context Every business is unique, with its own challenges, priorities, and opportu
Rachel Gentry
Feb 3, 20252 min read


How Information Security Links to Herzberg’s Two-Factor Theory: A Strategic Insight for Business Owners
An infographic style image of Information Security hygiene and motivator factors. Hygiene factors are in blue (for stability and...
Rachel Gentry
Jan 6, 20253 min read
Client Case Study: Helping a CTO simplify Security Compliance to Focus on Product Innovation
Client: Chief Technology Officer (CTO) of a rapidly growing tech company, struggling to meet ISO 27001 requirements while maintaining...
Rachel Gentry
Dec 9, 20242 min read


Why Now is the Perfect Time to Invest in Information Security – and Get Ahead of the Competition
In a world of economic uncertainty and rising costs, businesses may be tempted to put off investments in non-core areas. But when it...
Rachel Gentry
Nov 15, 20243 min read
bottom of page




