August 19, 2025
Local government organisations are increasingly relying on digital services to deliver essential functions - from public services to internal operations. With this growing reliance comes a higher risk of cyber threats.
August 14, 2025
As organisations continue to adopt AI, it's very important to follow approved IT policies and processes to ensure that deployment is secure, reliable, and compliant. What are the essential controls every team should implement when deploying AI systems?
July 10, 2025
IT policies play a critical role in guiding technology use, keeping data safe, and ensuring compliance. However, developing effective and sustainable IT policies requires not only technical expertise, but also meaningful stakeholder engagement. Stakeholders can range from end users and IT staff to HR, legal, governance officers, and in some cases external third parties.
June 05, 2025
As Artificial Intelligence (AI) and Large Language Models (LLMs) become more embedded in business operations, organisations must prioritise their data and information governance arrangements that is the policies, procedures, and processes that ensure responsible and ethical use of artificial intelligence systems within the organisation.
May 08, 2025
In an age of rapidly evolving cyber threats, organisations often focus on acquiring security tools or implementing new technologies. While these investments are valuable, both IT leaders and risk managers understand that tools and technologies alone cannot secure an enterprise. The real cornerstone of a strong cyber security program is robust, enforceable IT policy.
April 30, 2025
Protocol Policy Systems are pleased to announce the April release of new and enhanced features for Policy Management as a Service (PMaaS).
April 16, 2025
As an organisation that lives and breathes policies, processes, procedures, frameworks, standards etc, Protocol Policy Systems (PPS) has recently conducted a project to align the best practice policy content of Policy Management as a Service with the Cyber Assessment Framework requirements.
April 16, 2025
Cyber resilience refers to an organisation’s ability to protect critical services and prevent IT-related issues before they occur. This involves identifying vulnerabilities in systems supporting essential business functions and conducting risk assessments to understand the potential impact of outages. Once risks are clear, mitigation steps - such as adding load balancing to eliminate single points of failure in cloud infrastructure - can be implemented.
PROTOCOL POLICY SYSTEMS
Fill in the form or call us on (UK) +44 845 241 0099 or (NZ) +64 9 570 2233