Published 19 Sep 2018
Can posting a photograph of a family celebration on a personal media account really have an impact on your employer and the organization? The answer is yes and it’s known to happen. If social media privacy settings aren’t up-to-date then anyone – not just your friends – can ...
Cyber security|Cyber-attack|Data protection|RESILIA|Sensitive data|Threats
Published 25 Jun 2018
How willing are you to trust an email from a colleague you know, asking you to click a link or open an attachment? And what happens when you realize the person asking you to do something for them turns out not to be the person you believed they were? This is the nightma...
Authentication|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 05 Oct 2018
The much feared GDPR compliance date has come and gone. You have located the personal data your organization processes and ensured you have a lawful basis for processing it. You have published your privacy notices etc. Hopefully, as part of your readiness projects and progr...
Published 25 May 2016
Just because you can connect a device to the internet doesn't mean you should. While connected devices (commonly called the “Internet of Things”) can deliver new services, there needs to be security, privacy and clear ownership of data. The endgame for the Internet of ...
Behaviour|Cyber resilience|Data protection|Processes|RESILIA|Sensitive data|Vulnerability
Published 09 Feb 2018
What is GDPR, why should you care and how can AXELOS’ RESILIA™ best practice help you manage it? ITSM consultant and trainer, Stuart Rance has addressed these critical questions in AXELOS’ “ GDPR: Beyond Compliance ” White Paper. Handing over personal data to an organiza...
Cyber resilience|RESILIA|Risk management|Sensitive data|Training
Published 14 May 2018
Personal information is an asset that can create more value for customers, hence people want to share their data with organizations. However, the EU General Data Protection Regulation (GDPR) says we have to manage their data properly. From 25 May 2018, this applies insi...
Best practice|Cyber Resilience|Cyber-Attack|GDPR|Incident management|ITIL|Value
Published 31 Mar 2015
The case of the three UK judges sacked for viewing pornography using their official IT accounts raised some serious questions for the people involved, and their employers. The obvious question is how could men in these roles make such a terrible misjudgement and become invol...
Anti-Virus Software|Best Practice|Cyber Resilience|Cyber-attack|Privacy|Threats|Vulnerability
Published 02 Jun 2016
Is your organization ready for the biggest shake-up of data protection laws in 20 years? The European Union’s General Data Protection Regulation will take effect from this year with the aim of giving EU citizens greater control of what happens to their data and containing t...
Cyber resilience|Data protection|RESILIA|Risk management|Sensitive data|Skills
Published 20 Oct 2017
Organizations can use the introduction of GDPR in May 2018 to learn more about their customers while building customer loyalty and increasing efficiency. According to John McDermott, EMEA Portfolio Manager at Hewlett Packard Enterprise (HPE), the new regulations are a busine...
Behaviour|Customer engagement|Cyber resilience|Data protection|RESILIA|Training
Published 31 Oct 2018
In a second blog post looking at the cyber resilience challenge in the further and higher education market, Kuldip Sandhu of Innovative Quality Solutions, considers the responsibilities academic and administrative staff have in helping to beat the hackers. Universities ...