Featured Article:
What is shadow IT and how do you manage it?

Shadow IT is an obvious security risk. What causes it, where do the risks lie and how can the organisation both manage and learn from it?

Less rules, more goals. How recent changes in regulatory approaches can enable innovation in information security

Why step up your cyber security strategy?

Secure by Design?

The most popular cyber security standards explained

The Ascentor guide to a cyber safe summer holiday

How to pass Cyber Essentials PLUS first time

The OT and IT debate – is our critical infrastructure safe?

Choosing and managing data processors to comply with GDPR

The NIS Directive explained – compliance and guidance

Contact us

Your cyber security challenges and our pragmatic approach - we could be the perfect fit. Contact the team at Ascentor for an informal chat.