Category Archives: Information Risk Management

The one-stop guide to cyber security advice (Part 1)

Best cyber guides reviewed

 

 

 

 

 

 

 

 

It’s always the big cyber security attacks that steal the headlines, but dig a little deeper and there are everyday stories of hacker inflicted misery – many of which could have been prevented.

So, if you are increasingly concerned about the threat to your own data and are looking for advice, this guide is for you.

It’s part one of a two-part series reviewing the ‘best of’ the many respected sources of cyber security advice available, with some of our most popular articles included. Continue reading “The one-stop guide to cyber security advice (Part 1)” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

GDPR: Do you really need a Data Protection Officer (DPO)?

GDPR Data Protection Officer image

 

 

 

 

 

 

 

 

By now you’ll have heard that there’s huge change coming to European data protection law. The EU General Data Protection Regulation (GDPR) comes into force on 25th May 2018, replacing the Data Protection Act 1998 (DPA).

So, you’ve started doing your research as you prepare for GDPR – and you’ve noticed that the requirement to appoint a Data Protection Officer (DPO) is a feature of many articles. The DPO will play a key role in ensuring compliance with GDPR – but it’s not immediately obvious what is involved.

That’s why this article looks at what the role entails, the skill sets required and cuts through some of the confusion we’ve noticed. For example, what exactly is a DPO and does every organisation actually need to appoint one? Continue reading “GDPR: Do you really need a Data Protection Officer (DPO)?” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Convince your board – cyber attack prevention is better than cure

Cyber attack ahead

 

 

 

 

 

 

 

 

There is a recurring message in many of the surveys about cyber security. It’s broadly this: a high number of businesses say that cyber security is an important issue – but a low number report any evidence of actually doing something about it.

The latest Cyber Security Breach Survey 2017 illustrates this perfectly. IPSOS MORI interviewed 1,523 UK businesses. In 74% of cases the directors or senior management said that cyber security is a high priority but only 20% currently provide staff with cyber security training – and only 33% have any formal policies in place. Continue reading “Convince your board – cyber attack prevention is better than cure” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Ten steps to GDPR compliance

Ten steps to GDPR compliance

 

 

 

 

 

 

 

 

In our previous blog we discussed the four key areas of the General Data Protection Regulation (GDPR) and asked ‘What does it really mean for your organisation?’ With a looming launch date of 25th May 2018, our closing advice was “don’t leave it to the last minute or chance.”

Although GDPR is a huge data management undertaking, compliance needn’t be an insurmountable challenge. So, in this article we’ve summarised the steps an organisation needs to consider to ensure it does comply. Continue reading “Ten steps to GDPR compliance” »

avatar

Paddy Keating

Director and Government Service Manager at Ascentor

More Posts

Follow Me:
Twitter

Share

GDPR: What does it really mean for your organisation?

GDPR

 

 

 

 

 

 

 

 

25th May 2018 sees the indoctrination of the General Data Protection Regulation (GDPR) courtesy of the European Union. While eagerly anticipated by some organisations, for many the daunting reality of the changes GDPR brings is rapidly setting in.

There might have been a brief period of post Brexit vote uncertainty about GDPR – but it will go ahead as planned. In the world of data management, it’s time to smell the coffee. Continue reading “GDPR: What does it really mean for your organisation?” »

avatar

Paddy Keating

Director and Government Service Manager at Ascentor

More Posts

Follow Me:
Twitter

Share

How to manage Building Information Modelling (BIM) implementation – Part 2 of 2

Building Information Management (BIM) image

 

 

 

 

 

 

 

 

In our first article on Building Information Modelling (BIM), we looked at what BIM is and the types of data at risk in building projects. We discussed the threat to digital information and why cyber security needs to be an integral part of construction and refurbishment projects.

In part two we look at the process itself – how to manage BIM implementation and why managing the risks to building information doesn’t stop at the end of the build. Continue reading “How to manage Building Information Modelling (BIM) implementation – Part 2 of 2” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

An introduction to Building Information Modelling (BIM) – Part 1 of 2

Building Information Modelling

 

 

 

 

 

 

 

 

If you run your own construction business or manage large building projects, you will know about the many professions and trades that need to come together to contribute to a modern building or refurbishment. But does information risk and cyber security come into your thinking? If not, it should.

Such projects require detailed information to be transferred between partners such as designers and architects at the planning stage, followed by the construction teams.  A variety of software tools are available to support this process such as 3D modelling packages, CAD software and project management tools.

All of this generates large volumes of data that must be accurate and which has to get to the right people on time. What’s more, it has to be safe from threats – and remain that way. Continue reading “An introduction to Building Information Modelling (BIM) – Part 1 of 2” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

Cyber security in perspective – a look back at 2016

Year 2016

 

 

 

 

 

 

 

 

As we reflect on 2016, there are two stand out events that dwarf every other piece of news this year – the decision of the UK to leave the EU and the election of one Donald J Trump.  Both put cyber security in the spotlight in 2016 for different reasons – from the confusing to the bizarre.

But it wasn’t just the changing political landscape that caught our eye. Many organisations were affected by ransomware attacks and one high profile business discovered just how costly the on-going fall-out from their data breach would turn out to be.

So, let’s look back at 2016 through the cyber security lens of Ascentor. Continue reading “Cyber security in perspective – a look back at 2016” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

How to deliver digital transformation – without the security risk

 

Digital transformation is a major programme for many organisations. The motivation for it varies, but there are some common aspects, namely adopting new technologies to maintain an efficient and effective workforce and engaging with customers to improve the bottom line.

Likewise in the public sector, digital transformation programmes create opportunities for efficiency savings and economies of scale, with new and imaginative ways to deliver services to citizens. But the stakes are high. Get the security wrong and the programme could be the cause of a very public, and very expensive, loss of confidence. Continue reading “How to deliver digital transformation – without the security risk” »

avatar

Dave James

Information Risk Management expert and Managing Director of Ascentor

More Posts

Follow Me:
Twitter

Share

The Future of Information Assurance Accreditation

Checkbox on digital screen

 

 

 

 

 

 

 

 

Ascentor’s Paddy Keating attended the SUAC – Accreditors’ Professional Update and Development Event 2016 on 2-3 November 2016. One of the main topics regarded the future of accreditation within government centred on a recent consultation paper entitled Assuring Information Services for Government prepared by the Accreditation Specialism Advisor Group (ASAG).

The paper identified some drivers for change including efficiency, quality and speed but it also identified the underlying problem of accreditation and accreditors themselves having bad press. Here are Paddy’s reflections on the day. Continue reading “The Future of Information Assurance Accreditation” »

avatar

Paddy Keating

Director and Government Service Manager at Ascentor

More Posts

Follow Me:
Twitter

Share
 
Buy Cialis in UK