ISO27001:2013 one year on – What has changed?


A year on from the publication of ISO 27001:2013 I thought it worth reflecting on what the ‘new’ version of the specification has meant for those working with it, and whether it has addressed the criticisms levelled at the 2005 version. I’ll start by reflecting on what the 2013 version means for those that have […]

Five Must-See Cyber Crime Infographics


Nothing gets the heart pumping on a Monday like the thrill and shock of viewing infographics about cyber crime. OK, perhaps that’s a bit of an exaggeration, but the infographics below do promise to provide you with a great insight into cyber crime and what’s being done about it. I’ve hand-picked these infographics myself and […]

ITIL exam candidate numbers decline by 11% year-on-year.


The first consolidated ITIL® exam statistics have been released since AXELOS® took over as the official accreditor and since the cost of the exams increased. These statistics cover the first six months of 2014 and compare this period to the first six months in 2013. Overall, there has been an 11% decline in the number […]

It’s talk like a pirate day. Patch your network, not your eye.


Have you seen people walking around with peg legs and parrots on their shoulders whilst chugging down Rum with their Matey’s? If you have then you’re probably thinking you’ve woken up in Treasure Island but you’d be wrong, it’s talk like a pirate day. I’ve seen many people dressed like pirates today and have even […]

Why you can’t wait for the EU General Data Protection Regulation.


The EU Data Protection Directive aims to create a total reform of data protection legislation throughout Europe, in an effort to improve online privacy rights and boost the digital economy. Currently known as the EU Data Protection Directive, the EU Data Protection Regulation will immediately be binding in all of the EU member states when […]

Nigerian bank IT worker on the run after £23.5m cyber heist


Police in Nigeria are on the hunt for 38 year old IT worker, Godswill Oyegwa Uyoyou, for his involvement in a major cyber heist at the bank where he was employed. It’s believed that Uyoyou provided necessary steps to allow other thieves onto bank premises under the guise of maintenance workers. Uyoyou and his team […]

Technology alone won’t protect your customer’s data


When technology is mentioned in information security, it’s usually in reference to things like antivirus or anti-malware software, secure access doors, alarms, specialist software, etc. All of this technology has one thing in common: people. Technology is only effective if it’s implemented correctly, and that relies on people. Unfortunately, people can be careless and develop […]

Intel® IT Centre adopts ITGP book for its IT transformation webinar programme

Quantum Age of IT

According to Charles Araujo of the IT Transformation Institute, ‘IT as we know it is dead’. It’s a big claim, but in the ITGP bookThe Quantum Age of IT: why everything you know about IT is about to change, Charles presents the causes for this dramatic shift. He believes that organisations that don’t see the […]

What is the difference between certification and accredited certification?

The IT Governance service centre receives a large number of questions every day. One of the most common questions we receive is about the difference between certification and accredited certification. Understanding the difference between the two is vital for organisations that are embarking on an implementation project. Certification Certification is the procedure by which a […]

What is the Cyber Essentials scheme, and how do we comply?


On 21 August, IT Governance’s PCI expert, Alastair Stewart, conducted a free online webinar about the UK Cyber Essentials scheme. Attendee numbers were high as professionals across the country tuned in to learn more about the UK Government’s new scheme. If you were unfortunate enough to miss this webinar, you can view a recording below […]