Category InfoSec

Penetration Testing

Test your network infrastructure both locally and remotely with Penetration Testing from our technical partners. Regular testing can identify gaps in network security and enable you to correct issues before they are exploited. A pen test provides an impartial and…

Passwords

The Password Challenge

Passwords are a common method of protecting information and they are used every day in all kinds of situations. However passwords face numerous threats that could put your data in to the hands of organised criminals, or those more close…

Staff Screening: What are the Options?

Assent Tech Risk discusses the options for employers to security screen new staff. Choosing the right people for your organisation is critical and there are many factors to consider such as experience, qualifications and personality. Perhaps most importantly though, is…

BYOD

The Bring Your Own Device Challenge

Technology is now a very personal thing, and that trend is set to increase with the introduction of wearable tech. Staff are always ‘connected’ whether at home or at work, so inevitably the boundaries become blurred. Some companies have embraced the…

Shared Office Space: An ISO 27001 Approach

For a variety of commercial and operation reasons, office space can be shared between more than one organisation. This is particularly prominent in the tech start up culture, where ideas can be shared. However, when operating an Information Security Management…

STAR Certification for Cloud Service Providers

The Cloud Security Alliance (CSA) and BSI have partnered to develop a certification scheme dedicated to the security of cloud services. STAR Certification has been designed as an enhancement to ISO27001 and a response to growing business concerns over the…