Published 24 Mar 2020
The current coronavirus crisis has pushed ‘home and mobile working’ onto the front pages. Self-isolation is critically important as we work towards preventing the rapid spread of the virus. But how can we isolate ourselves from a different threat whilst working remotely or a...
Behaviour|BYOD|Cyber resilience|Cyber security|Cyber-attack|Data protection|Privacy|Threats|Vulnerability
Published 05 Oct 2018
The much feared GDPR compliance date has come and gone. You have located the personal data your organization processes and ensured you have a lawful basis for processing it. You have published your privacy notices etc. Hopefully, as part of your readiness projects and progr...
Published 25 Jun 2018
How willing are you to trust an email from a colleague you know, asking you to click a link or open an attachment? And what happens when you realize the person asking you to do something for them turns out not to be the person you believed they were? This is the nightma...
Authentication|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 28 Apr 2015
What can organizations do to deal with the accelerating problem of cyber breaches? Do they protect their network or their data? It’s a debate that has dominated last week’s RSA Conference in San Francisco - the worldwide event for information security - if the blogosphere fo...
Cyber Resilience|Cyber-attack|Data Protection|RESILIA
Published 09 Feb 2018
What is GDPR, why should you care and how can AXELOS’ RESILIA™ best practice help you manage it? ITSM consultant and trainer, Stuart Rance has addressed these critical questions in AXELOS’ “ GDPR: Beyond Compliance ” White Paper. Handing over personal data to an organiza...
Cyber resilience|RESILIA|Risk management|Sensitive data|Training
Published 02 Jun 2016
Is your organization ready for the biggest shake-up of data protection laws in 20 years? The European Union’s General Data Protection Regulation will take effect from this year with the aim of giving EU citizens greater control of what happens to their data and containing t...
Cyber resilience|Data protection|RESILIA|Risk management|Sensitive data|Skills
Published 25 May 2016
Just because you can connect a device to the internet doesn't mean you should. While connected devices (commonly called the “Internet of Things”) can deliver new services, there needs to be security, privacy and clear ownership of data. The endgame for the Internet of ...
Behaviour|Cyber resilience|Data protection|Processes|RESILIA|Sensitive data|Vulnerability
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 24 Aug 2016
The risk of being held to ransom is no longer just a phenomenon of the physical world - the digital world is subject to the menace of Ransomware . Ransomware is where an attacker renders your computer system and your data unavailable to you through encrypting your data and ...
Published 09 Oct 2017
AXELOS' 'Cyber Stories from the Frontline' brings to life the reality of cyber-crime for organizations today - and from the perspective of those who have first-hand experience: Have you ever worked on a project where deadlines have taken precedence over good practice and...
Behaviour|Best practice|Cyber resilience|Cyber security|Cyber-attack|Training