Tag Archives: cyber security

The Ascentor guide to a cyber safe summer holiday

Summer cyber security

 

 

 

 

 

 

 

 

 

“We’re all going on a summer holiday, no more logins for a week or two…”

Well, not exactly. The holiday season is about to get in full swing, but many of us will be traveling with the same devices we use at home and work – with all the associated security risks.

Using your devices with hotel or airport Wi-Fi? Taking your mobile to the beach? Posting your holiday plans on social media?

What could possibly go wrong? Continue reading “The Ascentor guide to a cyber safe summer holiday” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Preparation makes perfect – how to pass Cyber Essentials PLUS first time

How to pass CE+ first time

 

 

 

 

 

 

 

 

As anyone who’s ever run a race will know, it’s all about the preparation. As the saying goes, ‘if you fail to plan – you plan to fail’. The Government’s Cyber Essentials (CE) scheme is no different, especially at the Cyber Essentials PLUS (CE+) level where more work is involved.

Ascentor is an accredited certification body for CE, licensed by the IASME Consortium. In every case where clients have followed our advice at CE+ level, they’ve passed first time. So, we thought we’d share some of our preparation tips and give an insight into our process. Continue reading “Preparation makes perfect – how to pass Cyber Essentials PLUS first time” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

The OT and IT debate – is our critical infrastructure safe?

Power station critical national infrastructure

 

 

 

 

 

 

 

 

Back in 2011, GE coined the phrase “the Industrial Internet”. They were referring to how the gap between the operational technology (OT) that controls our critical infrastructure facilities and traditional enterprise information technology (IT) is closing. In the quest for smarter enterprise data, we are connecting our OT to our IT. Smart as that may seem, there can be unintended consequences – rather than a controlled ‘coming together’, it can be more of a fatal collision if the associated risks are ignored.

Seven years on, OT and IT are becoming more and more connected every day. Yet, there seems to be a level of denial that such connectivity exists. This can mean that critical cyber security controls are being ignored – a dangerous place to be. Continue reading “The OT and IT debate – is our critical infrastructure safe?” »

Share

The NIS Directive explained – compliance and guidance

NIS Directive explained

 

 

 

 

 

 

 

 

The Chinese have just celebrated the start of The Year of the Dog. But for anyone with responsibility for data security in their organisation, it’s very much ‘The Year of Regulation’. You’ll have heard plenty about the General Data Protection Regulation (GDPR), but what about the European Union’s other piece of security legislation, the Network and Information Security (NIS) Directive?

May is going to be a busy month in cyber security, with the NIS Directive being transposed into national law on 9th May, quickly followed by the GDPR on 25th May – as if you needed reminding. Continue reading “The NIS Directive explained – compliance and guidance” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

A look back at cyber security in 2017

2017 cyber security year in focus

 

 

 

 

 

 

 

 

If ever there was an article that started with a prediction that came true – it was our very first post of 2017, looking at the year ahead.

We quoted John Chambers, CEO of Cisco who had recently said “There are two types of organisation: those that have been hacked and those that don’t know they’ve been hacked.” We predicted it would increasingly be a case of ‘not if but when’. And, as we all know by now, this year it was very much ‘when’.

So, join us for a look back at some of the cyber security issues and incidents we covered in 2017. Continue reading “A look back at cyber security in 2017” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

BIM, Security and the Building Lifecycle

Building Information Modelling, London skyline

 

 

 

 

 

 

 

 

 

In our previous articles on Building Information Modelling (BIM) we have explained how information security should be part of implementing BIM for construction projects.

In this latest article we look at how the risks to information on construction and refurbishment projects change over the course of the building lifecycle, and what measures can be put in place to manage those risks. Continue reading “BIM, Security and the Building Lifecycle” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

Seven steps to designing a resilient Cyber Security Programme

Cyber attack, data breach image in shape of an eye

 

 

 

 

 

 

 

 

The reality for most organisations is that, despite their best cyber defences, they are going to experience a cyber-attack at some point. A resilient cyber security programme is all about the ability to not only deter and resist attacks – but also to detect and recover from them, returning to normal operation with minimal downtime.

Government has urged all sectors of the UK business community to improve their resilience to cyber-attacks and has introduced several initiatives to support this – such as the Cyber Essentials Scheme (CES). Of necessity, these initiatives are supportive in nature – it is still down to individual organisations to put into place the necessary strategy and technology to improve their resilience to cyber-attack. Continue reading “Seven steps to designing a resilient Cyber Security Programme” »

avatar

Peter Curran

Principal IA Consultant at Ascentor

More Posts

Follow Me:
Twitter

Share

The one-stop guide to cyber security advice (Part 2)

 

 

 

 

 

 

 

 

Last month we published the first of a two-part series on the best cyber security guides and articles on the web. It covered advice on educating your employees about cyber security, guidance for the board and tips for small and micro businesses.

The article was written for anyone increasingly concerned about the threat to their data and looking for advice – you can re-visit part-one here.

This month, in part-two, we point our lens at ransomware, the insider threat, guidance for suppliers to HM Government and there’s even a plain English guide to all that cyber security jargon. Continue reading “The one-stop guide to cyber security advice (Part 2)” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

The one-stop guide to cyber security advice (Part 1)

Best cyber guides reviewed

 

 

 

 

 

 

 

 

It’s always the big cyber security attacks that steal the headlines, but dig a little deeper and there are everyday stories of hacker inflicted misery – many of which could have been prevented.

So, if you are increasingly concerned about the threat to your own data and are looking for advice, this guide is for you.

It’s part one of a two-part series reviewing the ‘best of’ the many respected sources of cyber security advice available, with some of our most popular articles included. Continue reading “The one-stop guide to cyber security advice (Part 1)” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Convince your board – cyber attack prevention is better than cure

Cyber attack ahead

 

 

 

 

 

 

 

 

There is a recurring message in many of the surveys about cyber security. It’s broadly this: a high number of businesses say that cyber security is an important issue – but a low number report any evidence of actually doing something about it.

The latest Cyber Security Breach Survey 2017 illustrates this perfectly. IPSOS MORI interviewed 1,523 UK businesses. In 74% of cases the directors or senior management said that cyber security is a high priority but only 20% currently provide staff with cyber security training – and only 33% have any formal policies in place. Continue reading “Convince your board – cyber attack prevention is better than cure” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share