Unlike other providers, Ascentor offer a fully supported process to get your organisation fully Cyber Essentials compliant quickly and efficiently.
We’ll send you a free report on where you need to focus your improvement efforts
A paper for Senior Information Risk Owners (or equivalent) and their advisors
Ascentor’s cyber security review of 2020
Managing good cyber security when working from home – what employers need to know
The NHS response to cyber crime – effective measures and why they matter
12 practical cyber security tips for SMEs
How will a maturity model strengthen your cyber security?
What’s the difference between cyber security and cyber resilience – and why does resilience matter?
What is shadow IT and how do you manage it?
Why step up your cyber security strategy?
Secure by Design?
The most popular cyber security standards explained
The NIS Directive explained – compliance and guidance
A look back at cyber security in 2017
BIM, Security and the Building Lifecycle
Seven steps to designing a resilient Cyber Security Programme
The one-stop guide to cyber security advice (Part 2)
The one-stop guide to cyber security advice (Part 1)
Convince your board – cyber attack prevention is better than cure
Ransomware attacks – don’t let them happen to you
Why basic cyber security could save you a lot of wonga
An introduction to Building Information Modelling (BIM) – Part 1 of 2
‘Not if but when’ – 2017 UK cyber security in focus
The UK Cyber Security Strategy 2016-2021 – A New Sheriff in Town?
Cyber security in perspective – a look back at 2016
How to deliver digital transformation – without the security risk
Ransomware and Large Enterprises – a defence-in-depth strategy
Supply Chain Cyber Security – defeating the weakest link (Part 1)
Cyber Insurance – can you ever be fully covered?
Reflections on CyberUK in Practice – CESG’s government security conference
Ransomware – Back up or Pay up – 6 tips for single computer backups
5 ways to spring clean your cyber security
An ounce of prevention could be worth a ton of cyber attack cure
Cutting through the confusion: Government Information Assurance changes explained (part 3 of 3)
CLAS Consultancy is dead – long live the CCSC scheme?
IA15: Public trust in networks and data depends on security
The Human Face of Information Risk Re-visited
Do you need to TalkTalk about cyber security?
Cyber Security – is it on your ‘to-do’ list?
Government Information Security
Learning From the Experts – Tips from the 2013 Information Assurance Practitioners’ Event
Seminar Highlights: The Human Face of Information Risk
De-mystifying Cyber Security Terms