Published 18 Jun 2018
Do you know what it means to be the victim of cyber crime? For example, how does it feel to have your mobile device stolen and find that someone has used it to hack into confidential and valuable work information? If it’s never happened to you, or someone you know, it can b...
BYOD|Cyber Resilience|Cyber-Attack|Learning|RESILIA|Sensitive data|Training
Published 05 Jun 2014
Throughout the 25 years of its existence, ITIL has supported IT organizations in providing business value for their customers in the form of well-designed and supported services. ITIL has become the most widely used and most successful ITSM (IT Service Management) framework i...
Best Practice|IT Services|ITIL|Project Management|Service Management|Value
Published 03 Jul 2018
What’s there to fear from people contacting your organization purporting to be someone from a supplier with a change to company payment details? The problem is knowing whether that person is who they claim to be, or someone using sophisticated social engineering techniques t...
Cyber security|Cyber-Attack|Data Protection|RESILIA|Sensitive data|Threats|Vulnerability
Published 25 Jun 2018
How willing are you to trust an email from a colleague you know, asking you to click a link or open an attachment? And what happens when you realize the person asking you to do something for them turns out not to be the person you believed they were? This is the nightma...
Authentication|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 13 Sep 2018
Don’t get fooled into making costly mistakes … Have you seen the devastation a cyber breach can have on a business and its employees? The far-reaching impacts can include reputational loss, damage to competitive advantage and disruption to operational stability. These pro...
Cyber resilience|Cyber security|Cyber-attack|RESILIA|Sensitive data|Vulnerability
Published 19 Sep 2018
Can posting a photograph of a family celebration on a personal media account really have an impact on your employer and the organization? The answer is yes and it’s known to happen. If social media privacy settings aren’t up-to-date then anyone – not just your friends – can ...
Cyber security|Cyber-attack|Data protection|RESILIA|Sensitive data|Threats
Published 24 Mar 2020
The current coronavirus crisis has pushed ‘home and mobile working’ onto the front pages. Self-isolation is critically important as we work towards preventing the rapid spread of the virus. But how can we isolate ourselves from a different threat whilst working remotely or a...
Behaviour|BYOD|Cyber resilience|Cyber security|Cyber-attack|Data protection|Privacy|Threats|Vulnerability
Published 25 Jan 2016
As part of our Professional Development Programme , AXELOS has outlined the skills and competencies needed in a wide range of roles across IT service management and project and programme management. In this blog post, Pauline Brown – Service Operations Manager at the Un...
Continual Service Improvement (CSI)|CPD|IT services|ITIL|Qualifications|Service desk|Skills
Published 04 Nov 2016
Following the launch of our updated ITIL Foundation app, we spoke to Sharon Taylor, chief examiner for ITIL and content advisor to find out about its new features and get her top tips on passing the exam. While the ITIL Foundation app has been available since 2013, ther...
Certification|Examinations|IT Service Management (ITSM)|ITIL|Skills