News

A look back at cyber security in 2017

2017 cyber security year in focus

 

 

 

 

 

 

 

 

If ever there was an article that started with a prediction that came true – it was our very first post of 2017, looking at the year ahead.

We quoted John Chambers, CEO of Cisco who had recently said “There are two types of organisation: those that have been hacked and those that don’t know they’ve been hacked.” We predicted it would increasingly be a case of ‘not if but when’. And, as we all know by now, this year it was very much ‘when’.

So, join us for a look back at some of the cyber security issues and incidents we covered in 2017. Continue reading “A look back at cyber security in 2017” »

BIM, Security and the Building Lifecycle

Building Information Modelling, London skyline

 

 

 

 

 

 

 

 

 

In our previous articles on Building Information Modelling (BIM) we have explained how information security should be part of implementing BIM for construction projects.

In this latest article we look at how the risks to information on construction and refurbishment projects change over the course of the building lifecycle, and what measures can be put in place to manage those risks. Continue reading “BIM, Security and the Building Lifecycle” »

GDPR: What does the Regulation require when capturing consent?

GDPR: Capturing consent

 

 

 

 

 

 

 

 

The EU General Data Protection Regulation (GDPR) brings with it new requirements for the capture and use of consent to process personal data, along with new puzzles and misconceptions about the requirement for its use for data controllers.

Whilst we await publication of new guidance from the Information Commissioner’s Office on consent, we’re taking a look at the options around consent and the legality of processing data. Continue reading “GDPR: What does the Regulation require when capturing consent?” »

Seven steps to designing a resilient Cyber Security Programme

Cyber attack, data breach image in shape of an eye

 

 

 

 

 

 

 

 

The reality for most organisations is that, despite their best cyber defences, they are going to experience a cyber-attack at some point. A resilient cyber security programme is all about the ability to not only deter and resist attacks – but also to detect and recover from them, returning to normal operation with minimal downtime.

Government has urged all sectors of the UK business community to improve their resilience to cyber-attacks and has introduced several initiatives to support this – such as the Cyber Essentials Scheme (CES). Of necessity, these initiatives are supportive in nature – it is still down to individual organisations to put into place the necessary strategy and technology to improve their resilience to cyber-attack. Continue reading “Seven steps to designing a resilient Cyber Security Programme” »

Are you sure it’s just an RMADS you need?

Risk

 

The case for a considered approach to Information Assurance on MOD projects

“Just get a contractor in to write an RMADS when we’ve finished testing the system.”

How many times have we heard those fateful words?  And how many times have we put our heads in our hands and almost cried?

“What’s the problem?” you may ask. Well, in this article, we’ll explain.

We’ll make a balanced case for why your approach to Information Assurance (IA – making sure your information stays secure) would benefit from a more holistic approach. Continue reading “Are you sure it’s just an RMADS you need?” »

The one-stop guide to cyber security advice (Part 2)

 

 

 

 

 

 

 

 

Last month we published the first of a two-part series on the best cyber security guides and articles on the web. It covered advice on educating your employees about cyber security, guidance for the board and tips for small and micro businesses.

The article was written for anyone increasingly concerned about the threat to their data and looking for advice – you can re-visit part-one here.

This month, in part-two, we point our lens at ransomware, the insider threat, guidance for suppliers to HM Government and there’s even a plain English guide to all that cyber security jargon. Continue reading “The one-stop guide to cyber security advice (Part 2)” »

The one-stop guide to cyber security advice (Part 1)

Best cyber guides reviewed

 

 

 

 

 

 

 

 

It’s always the big cyber security attacks that steal the headlines, but dig a little deeper and there are everyday stories of hacker inflicted misery – many of which could have been prevented.

So, if you are increasingly concerned about the threat to your own data and are looking for advice, this guide is for you.

It’s part one of a two-part series reviewing the ‘best of’ the many respected sources of cyber security advice available, with some of our most popular articles included. Continue reading “The one-stop guide to cyber security advice (Part 1)” »

How to prepare your company for achieving List X

Top secret file

 

 

 

 

 

 

 

 

Here at Ascentor we get many companies asking us how they can become a List X company. The answer is always the same – it is not something that you can just do; you must have a contract, usually with the MOD, that requires you to hold sensitive government assets on your own premises. However, there are a few things you can do to prepare if you think a contract may be forthcoming.

This blog aims to give you a few hints and tips about some pragmatic steps you can take to get you up and running as a List X company much quicker. Continue reading “How to prepare your company for achieving List X” »

GDPR: Do you really need a Data Protection Officer (DPO)?

GDPR Data Protection Officer image

 

 

 

 

 

 

 

 

By now you’ll have heard that there’s huge change coming to European data protection law. The EU General Data Protection Regulation (GDPR) comes into force on 25th May 2018, replacing the Data Protection Act 1998 (DPA).

So, you’ve started doing your research as you prepare for GDPR – and you’ve noticed that the requirement to appoint a Data Protection Officer (DPO) is a feature of many articles. The DPO will play a key role in ensuring compliance with GDPR – but it’s not immediately obvious what is involved.

That’s why this article looks at what the role entails, the skill sets required and cuts through some of the confusion we’ve noticed. For example, what exactly is a DPO and does every organisation actually need to appoint one? Continue reading “GDPR: Do you really need a Data Protection Officer (DPO)?” »

Convince your board – cyber attack prevention is better than cure

Cyber attack ahead

 

 

 

 

 

 

 

 

There is a recurring message in many of the surveys about cyber security. It’s broadly this: a high number of businesses say that cyber security is an important issue – but a low number report any evidence of actually doing something about it.

The latest Cyber Security Breach Survey 2017 illustrates this perfectly. IPSOS MORI interviewed 1,523 UK businesses. In 74% of cases the directors or senior management said that cyber security is a high priority but only 20% currently provide staff with cyber security training – and only 33% have any formal policies in place. Continue reading “Convince your board – cyber attack prevention is better than cure” »

Latest News

Recent Comments

    • Barry Harvey: It is perhaps surprising to hear that a generation we think of as being tech savvy is anything but....
    • David Conway: I can imagine that, even at this stage, many businesses will still be blissfully unaware of this...
    • Sonja Jefferson: Are you going to be offering that training for ‘normal, non-techie people that now have...
    • Dave James: @Colin Robbins: Yes, Its really illumintaing isnt’t it. Provides a bit of context to the recent...
    • Colin Robbins: Very interesting report. I find it staggering that 26% of companies had not briefed their boards on...
  •