Published 18 Jun 2018
Do you know what it means to be the victim of cyber crime? For example, how does it feel to have your mobile device stolen and find that someone has used it to hack into confidential and valuable work information? If it’s never happened to you, or someone you know, it can b...
BYOD|Cyber Resilience|Cyber-Attack|Learning|RESILIA|Sensitive data|Training
Published 05 Jun 2014
Throughout the 25 years of its existence, ITIL has supported IT organizations in providing business value for their customers in the form of well-designed and supported services. ITIL has become the most widely used and most successful ITSM (IT Service Management) framework i...
Best Practice|IT Services|ITIL|Project Management|Service Management|Value
Published 19 Mar 2015
I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connect...
Best Practice|Confidentiality|Cyber Resilience|Data protection|Frameworks|Risk management
Published 03 Jul 2018
What’s there to fear from people contacting your organization purporting to be someone from a supplier with a change to company payment details? The problem is knowing whether that person is who they claim to be, or someone using sophisticated social engineering techniques t...
Cyber security|Cyber-Attack|Data Protection|RESILIA|Sensitive data|Threats|Vulnerability
Published 25 Jun 2018
How willing are you to trust an email from a colleague you know, asking you to click a link or open an attachment? And what happens when you realize the person asking you to do something for them turns out not to be the person you believed they were? This is the nightma...
Authentication|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 13 Sep 2018
Don’t get fooled into making costly mistakes … Have you seen the devastation a cyber breach can have on a business and its employees? The far-reaching impacts can include reputational loss, damage to competitive advantage and disruption to operational stability. These pro...
Cyber resilience|Cyber security|Cyber-attack|RESILIA|Sensitive data|Vulnerability
Published 19 Sep 2018
Can posting a photograph of a family celebration on a personal media account really have an impact on your employer and the organization? The answer is yes and it’s known to happen. If social media privacy settings aren’t up-to-date then anyone – not just your friends – can ...
Cyber security|Cyber-attack|Data protection|RESILIA|Sensitive data|Threats
Published 25 Jan 2016
As part of our Professional Development Programme , AXELOS has outlined the skills and competencies needed in a wide range of roles across IT service management and project and programme management. In this blog post, Pauline Brown – Service Operations Manager at the Un...
Continual Service Improvement (CSI)|CPD|IT services|ITIL|Qualifications|Service desk|Skills
Published 04 Nov 2016
Following the launch of our updated ITIL Foundation app, we spoke to Sharon Taylor, chief examiner for ITIL and content advisor to find out about its new features and get her top tips on passing the exam. While the ITIL Foundation app has been available since 2013, ther...
Certification|Examinations|IT Service Management (ITSM)|ITIL|Skills