Published 24 Mar 2020
The current coronavirus crisis has pushed ‘home and mobile working’ onto the front pages. Self-isolation is critically important as we work towards preventing the rapid spread of the virus. But how can we isolate ourselves from a different threat whilst working remotely or a...
Behaviour|BYOD|Cyber resilience|Cyber security|Cyber-attack|Data protection|Privacy|Threats|Vulnerability
Published 23 Apr 2020
Service continuity management, along with IT security, is top of the critical list for IT today – not least in the current global situation caused by Covid-19 . If you don’t have service continuity management and something major happens, it could ruin your business and – cl...
Cloud computing|Customer needs|Information systems|Infrastructure|IT service management (ITSM)|IT services|ITIL 4|Risk management|Service desk|Service management|Threats|Vulnerability
Published 06 Aug 2020
Happy, safe employees generally stay longer at their organizations, are more productive, and cause fewer incidents. Successful leaders know this and actively develop safety cultures— climates in which people are comfortable being (and expressing) themselves—to make sure that ...
Best practice|Communication|IT service management (ITSM)|ITIL 4
Published 24 Mar 2016
This is the first in a series of conversations with Nick Wilding and leading cyber resilience commentators and practitioners from around the world. Who should countries and companies learn from when thinking about cyber resilience? Estonia has been described in tech pub...
Published 29 Oct 2015
When Dido Harding, the CEO of TalkTalk, recently announced there was a chance that all their four million customers’ personal data might have been compromised, she could not have imagined the tsunami of press and media coverage that resulted. It all happened so quickly – 48 ...
Confidentiality|Cyber Resilience|Cyber-attack|Data Protection|Risk management|Sensitive data|Vulnerability
Published 16 Mar 2016
Christian Tijsmans is founder of Connect the Dotz and Paul Wilkinson is the owner/director of GamingWorks How critical is cyber security training for organizations? Not-for-profit IT governance body, ISACA said in its State of Cybersecurity report that 82% of board dire...
Cyber resilience|Cyber-attack|Learning|RESILIA|Risk management|Vulnerability
Published 25 May 2016
Just because you can connect a device to the internet doesn't mean you should. While connected devices (commonly called the “Internet of Things”) can deliver new services, there needs to be security, privacy and clear ownership of data. The endgame for the Internet of ...
Behaviour|Cyber resilience|Data protection|Processes|RESILIA|Sensitive data|Vulnerability
Published 08 Jun 2016
Dear Mr or Mrs Private Company Director – do you know who you are handing your personal information to and why? For all of you, there is an information security risk when third parties are asking for your personal details. Why? Do you know how securely they will treat your i...
Cyber resilience|Cyber-attack|Data protection|RESILIA|Vulnerability
Published 09 Aug 2016
The issue with Delta Air Lines’ computer system on 8 August 2016 created chaos for travellers around the world. The official reason for the systems crash was a power outage, initially described as something outside of Delta’s control, a claim that has not been backed up by t...
Information systems|IT Service Management (ITSM)|IT Services|Processes|Vulnerability
Published 24 Aug 2016
The risk of being held to ransom is no longer just a phenomenon of the physical world - the digital world is subject to the menace of Ransomware . Ransomware is where an attacker renders your computer system and your data unavailable to you through encrypting your data and ...
Published 03 Feb 2017
Board directors, business leaders and entrepreneurs are known as ‘whales’. You’re the big fish who holds the key to the really big prize for hackers. Whether that’s intellectual property, commercially and market sensitive information or simply money, there are hackers out the...
Published 16 Nov 2018
As part of the CBI Cyber Security Conference 2018 , Ciaran Martin, CEO of the National Cyber Security Centre hosted a Keynote session. Here are a few key takeaways from his session. There is a culture shift in business about cyber security and evidence that business l...
Cyber resilience|Cyber security|Cyber-attack|Governance|Threats|Vulnerability
Published 24 Jun 2015
Process implementation in IT Service Management (ITSM) comprises the steps we take to deliver services and the changes necessary to support the business moving forward.The purpose of IT is to be a business partner, ensuring anything that falls within the remit of delivering ...
Best Practice|Change management|Customer engagement|Frameworks|IT Service Management (ITSM)|Leadership|Processes
Published 20 Mar 2017
The internet plays a huge part in our lives: for work, staying in touch with our friends, shopping, playing games, studying or just watching some hilarious cat videos, we are spending more and more time online. We are bombarded with more and more information and the technol...
Published 20 Apr 2016
One hundred percent of US Fortune 100 companies use the ITIL framework to manage, govern and keep their IT environment safe, so why isn’t ITIL training a priority at all of these organizations? In the past, product lifecycles were longer. You would develop a product, pu...
IT Service Management (ITSM)|ITIL|Knowledge management|RESILIA|Skills|Training
Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 12 Nov 2019
How well prepared are organizations for the activities of cyber criminals in 2019? Organizations want to feel their efforts have made a difference to answering the question “ are we secure? ” However, there is no perfect solution or ability to be 100% secure; the real aim is...
Behaviour|Cyber security|Cyber-attack|Data protection|Learning|Privacy|Senior management commitment|Senior team|Sensitive data