James Warren Archive
Taken from our information security image gallery, here are 8 kickass cyber security awareness tips for you to share with your team. Use them to inspire positive change in behaviour and raise awareness within your organisation:
What does effective cyber security look like?
The many standards and sources of best practice on cyber security tend to focus on delivery (the how).
PAS 555:2013 is the new Cyber Security Risk Governance and Management standard, and details what effective cyber …
Are you unsure what PRINCE2 is and how it could benefit your organisation? Our new PRINCE2 factsheet was written to help managers and prospective project managers understand the benefits of PRINCE2 processes and training. PRINCE2 is one of the most …
Data protection seems to have a bit of an image problem. What began with such good intentions is fast becoming a scapegoat for silly decisions, overzealous practitioners and an awful lot of paperwork. Slightly bonkers stories, such as the letter …
IT governance is a key organisational responsibility. Ensuring your IT strategy complies with regulatory requirements, risk management best practice and your organisational goals is essential for the success of an organisation – long or short term. There are plenty of …
As the European Horse Meat debacle continues to lead the headlines, I'm wondering how many more organisations are going to be put under the spotlight, and which of the already shamed brands will survive. Reputational damage will no doubt cause …
I took some time out this morning to read a 2012 data breach report by Verizon, which was sent to us via a Tweet from @RiverviewLaw on Twitter. Whilst many of the findings didn’t come as a surprise, it did …
Back to managing IT as a service – whether you’re tackling ITSM, ITIL or ISO20000, we can help – with resources that range from toolkits and training for those doing it themselves all the way up to full-blooded consultancy aimed …
For commercial organisations, service disruptions, delays in responding to customer requests, inability to process transactions in a timely manner or being unable to resume business in the face of a disaster can all have significant impacts on the effective operation …
A Certified Ethical Hacker tests your cyber defences under contract to identify weaknesses, so that you can fix the problems – before a malicious hacker finds them and takes advantage of you!