Category Risk

Cyber Essentials Scheme

From 1st October 2014 the UK government has required all suppliers bidding for certain sensitive and personal information handling contracts to be certified against the Cyber Essentials scheme. The Scheme provides a basic set of technical controls that organisations can…

Where is my Data?

Where is my Data?

In a few short years the tech landscape has changed dramatically, powered by the giant Silicon Valley firms and innovated by small tech start-ups from London and other scenes around the world. Storage and processing of data is moving away…

Penetration Testing

Test your network infrastructure both locally and remotely with Penetration Testing from our technical partners. Regular testing can identify gaps in network security and enable you to correct issues before they are exploited. A pen test provides an impartial and…

Passwords

The Password Challenge

Passwords are a common method of protecting information and they are used every day in all kinds of situations. However passwords face numerous threats that could put your data in to the hands of organised criminals, or those more close…

The Week in Fuel.

This week I have seen two articles from different sources regarding the fuel we put in our cars. The first article is from the BBC and is based on research conducted in America: it discusses the idea that removing lead…

Staff Screening: What are the Options?

Assent Tech Risk discusses the options for employers to security screen new staff. Choosing the right people for your organisation is critical and there are many factors to consider such as experience, qualifications and personality. Perhaps most importantly though, is…