Published 01 Apr 2020
Companies worldwide are now realizing that cyber resilience is not just a “good to have”, but a necessity. It’s no longer a question of if but when risks will emerge and when vulnerabilities are exploited with threats relating to information assets such as data, syst...
Published 23 Apr 2015
When I read about the latest cyber attack in the press I wonder how the ordinary person in the street is responding to the same story. Do they feel interested or intrigued? Do they want to understand more? Do they feel that they have a part to play? I suspect most don’t but i...
Published 17 Apr 2015
Politics often throws up examples of highly memorable, and equally emotive, language designed to make voters think a certain way about a particular party. The UK’s current election fever is no different, with politicians coining the rather loaded phrase, “Weaponizing the NHS...
Published 29 Oct 2015
When Dido Harding, the CEO of TalkTalk, recently announced there was a chance that all their four million customers’ personal data might have been compromised, she could not have imagined the tsunami of press and media coverage that resulted. It all happened so quickly – 48 ...
Confidentiality|Cyber Resilience|Cyber-attack|Data Protection|Risk management|Sensitive data|Vulnerability
Published 12 May 2016
CIOs have overall responsibility for IT strategy within a business and are accountable for the governance and management of IT resources. In most organizations, the CIO is someone with a broad knowledge of IT and is able to provide vision and leadership in all aspects of IT...
Communication|IT services|Leadership|Resource management|Skills
Published 15 Jan 2020
As technology becomes more and more embedded in company processes, businesses need to look beyond the traditional ways of securing their organizations’ most valuable assets. This involves approaches that engage with people and understand their needs and perspectives on secu...
Behaviour|Communication|Confidentiality|Cyber resilience|Cyber security|Cyber-attack|Data protection|Empowerment
Published 17 May 2017
We’re used to seeing headlines like those we woke up to on 13 May 2017. ‘Huge ransomware attack hits hospitals’. ‘Unprecedented global ransomware attack’. ‘Global cyber-crime hits a new high’. TV and media reporting has continued the hyperbole since the news was first reporte...
Anti-Virus Software|Confidentiality|Cyber Resilience|Cyber-Attack|Data Protection|RESILIA|Risk Management|Sensitive data|Threats|Vulnerability
Published 01 Jul 2015
This year AXELOS launched the AXELOS Consulting Partner Programme . The programme allows consulting organizations to enter into an official partnership with AXELOS for the first time. The programme is part of our continuing commitment to ensure all organizations that use our...
Best Practice|Maturity models