Tag Archives: cyber security

An introduction to Building Information Modelling (BIM) – Part 1 of 2

Building Information Modelling

 

 

 

 

 

 

 

 

If you run your own construction business or manage large building projects, you will know about the many professions and trades that need to come together to contribute to a modern building or refurbishment. But does information risk and cyber security come into your thinking? If not, it should.

Such projects require detailed information to be transferred between partners such as designers and architects at the planning stage, followed by the construction teams.  A variety of software tools are available to support this process such as 3D modelling packages, CAD software and project management tools.

All of this generates large volumes of data that must be accurate and which has to get to the right people on time. What’s more, it has to be safe from threats – and remain that way. Continue reading “An introduction to Building Information Modelling (BIM) – Part 1 of 2” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

‘Not if but when’ – 2017 UK cyber security in focus

2017-uk-cyber-security

 

 

 

 

 

 

 

 

2017 is Ascentor’s thirteenth year in information risk management. Over the years we’ve helped public and private sector organisations address the challenging landscape of cyber security and information assurance. Each year brings different threats – those we already recognise evolve, others are completely new. At the same time the legislative horizon changes as new standards and regulations come into force.

We started 2017 by quoting a tweet from John Chambers, CEO of Cisco, that is as good as any in describing the challenges of the year ahead. “There are two types of organisation: those that have been hacked & those that don’t know they’ve been hacked.” So, it’s increasingly a case of ‘not if but when’ – and a lot of household-name organisations know how painful that felt last year. Continue reading “‘Not if but when’ – 2017 UK cyber security in focus” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

The UK Cyber Security Strategy 2016-2021 – A New Sheriff in Town?

UK cyber security strategy 2016

 

 

 

 

 

 

 

 

On 1st November 2016, the Chancellor of the Exchequer launched the latest UK Cyber Security Strategy. In a year that has seen rising international tensions around hacking, Philip Hammond commented that hostile “foreign actors” were developing techniques that threaten the country’s electrical grid and airports.

The £1.9bn new strategy will also help enlarge specialist police units that tackle organised online gangs – and contribute towards the education and training of cyber security experts. The programme is funded until the end of 2020. Continue reading “The UK Cyber Security Strategy 2016-2021 – A New Sheriff in Town?” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

Cyber security in perspective – a look back at 2016

Year 2016

 

 

 

 

 

 

 

 

As we reflect on 2016, there are two stand out events that dwarf every other piece of news this year – the decision of the UK to leave the EU and the election of one Donald J Trump.  Both put cyber security in the spotlight in 2016 for different reasons – from the confusing to the bizarre.

But it wasn’t just the changing political landscape that caught our eye. Many organisations were affected by ransomware attacks and one high profile business discovered just how costly the on-going fall-out from their data breach would turn out to be.

So, let’s look back at 2016 through the cyber security lens of Ascentor. Continue reading “Cyber security in perspective – a look back at 2016” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

How to deliver digital transformation – without the security risk

 

Digital transformation is a major programme for many organisations. The motivation for it varies, but there are some common aspects, namely adopting new technologies to maintain an efficient and effective workforce and engaging with customers to improve the bottom line.

Likewise in the public sector, digital transformation programmes create opportunities for efficiency savings and economies of scale, with new and imaginative ways to deliver services to citizens. But the stakes are high. Get the security wrong and the programme could be the cause of a very public, and very expensive, loss of confidence. Continue reading “How to deliver digital transformation – without the security risk” »

avatar

Dave James

Information Risk Management expert and Managing Director of Ascentor

More Posts

Follow Me:
Twitter

Share

Ransomware and Large Enterprises – a defence-in-depth strategy

Ransomware antivirus immunization word cloud concept.

 

 

 

 

 

 

 

 

 

Part 3 in a series of blogs on ransomware. Ransomware is on the rampage. Earlier in the year barely a week would go by without a report of a costly attack. Now it’s almost a daily news story with reports suggesting that the number of attacks increased by 30 per cent in August alone. Even worse, payment doesn’t necessarily come with any guarantees. A recent article from infosecurity magazine found that 1 in 5 UK organisations that paid during a ransomware attack didn’t get their data back.

In this climate, the question is how to have confidence that you are on top of the problem, with a good chance of prevention and a coherent strategy to recover from it without having to pay up. Continue reading “Ransomware and Large Enterprises – a defence-in-depth strategy” »

avatar

Peter Curran

Principal IA Consultant at Ascentor

More Posts

Follow Me:
Twitter

Share

Supply Chain Cyber Security – defeating the weakest link (Part 1)

Cyber chain 2

 

 

 

 

 

 

 

 

It’s an everyday story but it could happen in your business – right under your nose and far more easily than you could have imagined. Who’d have thought that a contractor would cost millions in lost revenue and nearly bring the business to its knees? But that’s what a weak link in your supply chain cyber security can do.

Picture the scene… Brian parks in the street around the corner from work and walks down the side of his company building. The back door, propped half open by the fire extinguisher, makes entry a breeze. He takes off his balaclava and walks down the corridor to the server room. Brian provides IT support to this and other local companies and, as IT system administrator, he has the keys to the server room door… Continue reading “Supply Chain Cyber Security – defeating the weakest link (Part 1)” »

avatar

Steve Maddison

Director and Principal Consultant

More Posts

Share

Cyber Insurance – can you ever be fully covered?

Cyber insurance image

 

 

 

 

 

 

 

 

Whether it be from hackers, careless employees, malicious insiders or ransomware (pick your own threat list) – organisations are under increasing risk of cyber attack. And, wherever there is a risk – there’s the option of insurance.

Cyber insurance, also referred to as cyber risk insurance or cyber liability insurance coverage (CLIC), has been around for over a decade. Now, as cyber threats grow, cyber insurance looks set to join other business insurance policies in the risk management toolkit. But, can it really adequately compensate against the consequences of an attack? Continue reading “Cyber Insurance – can you ever be fully covered?” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Reflections on CyberUK in Practice – CESG’s government security conference

CyberUK

 

 

 

 

 

 

 

Ascentor went to the ‘CyberUK in Practice’ event in Liverpool on the 24th and 25th May, organised by CESG. Bringing government, industry and the wider public sector together, the event addressed how we can collectively make the UK safer online.

Over 900 delegates attended, with 60 speakers from government and industry. There was no shortage of topics covered and new developments shared. Indeed, Alex Dewdney, Director of Cyber Security at GCHQ described the event as a ‘step change in how government does cyber security.’

So, with a little time to reflect on the event, we’ve summarised what we thought were the main cyber security discussion points for government and industry. Continue reading “Reflections on CyberUK in Practice – CESG’s government security conference” »

avatar

Ben Wheeler

Ascentor marketing and content editor.

More Posts

Share

Ransomware – Back up or Pay up – 6 tips for single computer backups

Symbol of internet security with binary character hand and padlock to represent ransomware

 

 

 

 

 

 

 

 

Part 1 in a series of blogs on ransomware. The number of ransomware attacks is on the increase with cyber criminals using this tactic in “alarming” numbers – according to security researchers quoted on BBC News.

Wikipedia defines ransomware as a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.”

A conservative estimate is that about two thirds of all new malicious code releases include some form of ransomware. The tools are now easily available, the risks of being caught are comparatively small and the profits are huge. To top it all, the main defence is the human user and we all know how unreliable that can be.

The question is no longer how you prevent the infection, but what you have to do to recover from it without having to pay up. Continue reading “Ransomware – Back up or Pay up – 6 tips for single computer backups” »

avatar

Paddy Keating

Director and Government Service Manager at Ascentor

More Posts

Follow Me:
Twitter

Share
 
Buy Cialis in UK