Published 24 Aug 2017
Phishing , Trojan Horses, Malware, Whaling , Denial of Service – these are all terms that have become common currency in the world of cyber security. With increasing public exposure of global organizations’ cyber security vulnerabilities , the language of cyber threats a...
Behaviour|Cyber resilience|Cyber security|Cyber-attack|RESILIA|Threats|Vulnerability
Published 24 Oct 2016
While security threats are constantly evolving and becoming more sophisticated our industry’s approach to cyber safety has - in the main - not developed at the same rate. Frequently, businesses have a ‘set it and forget it’ approach, tackling cyber security when an employee...
Published 27 Jul 2018
An AXELOS webinar – Protecting the reputation of UK Further and Higher Education with your greatest defence: your people – has highlighted how Further and Higher Education establishments are the ideal target for cyber attackers. Education institutions hold personal and fin...
Behaviour|Cyber Resilience|Cyber security|Cyber-Attack|RESILIA|Sensitive data|Threats|Vulnerability
Published 03 Jul 2018
What’s there to fear from people contacting your organization purporting to be someone from a supplier with a change to company payment details? The problem is knowing whether that person is who they claim to be, or someone using sophisticated social engineering techniques t...
Cyber security|Cyber-Attack|Data Protection|RESILIA|Sensitive data|Threats|Vulnerability
Published 30 Aug 2016
No matter how sophisticated an organization’s technical controls, there is always a risk of attack. In this day and age, with the great speed at which technology is advancing, the constant evolution of threats makes it impossible for any business to be 100% protected; what th...
Published 20 Nov 2018
As part of the CBI Cyber Security Conference 2018 , experts hosted a future looking session to “examine the latest threat intelligence and emerging risks for businesses in the cyber security landscape”. The panel considered what threat and risk issues boards need to be addr...
Best practice|Cyber resilience|Cyber security|Cyber-attack|GDPR|Threats
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 11 Jun 2019
How using MSP can help organize a successful music festival It’s the time of year when it seems everyone is getting excited about music festivals. But what is it like behind the scenes? Do organizers think of Woodstock in 1969? Love peace, and “everywhere was a song and a c...
Frameworks|MSP|Programme management|Strategy execution|Threats|Value
Published 12 Oct 2016
Studying the risk management dimension of the RESILIA Foundation course will enable people to better understand what is a threat, a vulnerability and an asset in the context of cyber resilience and how they combine to create a risk to the business. One way to understand the...
Cyber resilience|Examinations|RESILIA|Risk management|Threats|Vulnerability
Published 19 Sep 2018
Can posting a photograph of a family celebration on a personal media account really have an impact on your employer and the organization? The answer is yes and it’s known to happen. If social media privacy settings aren’t up-to-date then anyone – not just your friends – can ...
Cyber security|Cyber-attack|Data protection|RESILIA|Sensitive data|Threats