Viewing entries tagged with 'security'

2019 01 10 Cyber security is not just for work IMAGE

14

January

Cyber security is not just for work

I write lots of blogs, and deliver training courses on cybersecurity. I nearly always focus on the security of business systems and networks, but it is equally important to think about cyber security in our personal lives.

2018 08 08 How to manage major incidents and security breaches IMAGE

8

August

How to manage major incidents and security breaches

Major incidents and security breaches are different. Learning from experience can turn out to be hugely expensive, or even result in the organization concerned going out of business. So how can you make sure that you handle these incidents correctly first time?

2017 08 09 Goldilocks does security Three bears

14

August

Goldilocks does security

If you are responsible for security try to be like Goldilocks. Not too much security, not too little, but just right.

2016 09 13 Security Theatre Doesnt Make You Any Safer IMAGE

12

September

Security Theatre Doesn’t Make You Any Safer

Do your people know not just what your security controls do, but why? Do they really protect your assets, or are they just security theatre?

Padlock Image

17

March

Information Security and Encryption - an Overview

It’s not possible to make good decisions about the security controls you need on a purely technical basis. but there are some controls that nearly all of us need, and one of the most important of these is encryption...

RESILIA Cover

24

July

Managing cyber resilience with RESILIA

RESILIA™ Cyber Resilience Best Practice was launched in June 2015.  What is it and how is it different from all the other publications out there that tell you how to manage information security?

Optimal Service Management Ltd.

7 Ingatestone Road, Woodford Green,
Essex, IG8 9AN, UK

Registered No: 8791379 England

Phone: +44 20 8504 2002

Recent Posts

  • 2017 03 16 What configuration data do you need IMAGE
    3 ways to approach configuration management

    There are three very different approaches you can take to configuration management.  Each of them has benefits and disadvantages, and you need to blend aspects of all three to get the best value in your context.

  • 2019 01 10 Cyber security is not just for work IMAGE
    Cyber security is not just for work

    I write lots of blogs, and deliver training courses on cybersecurity. I nearly always focus on the security of business systems and networks, but it is equally important to think about cyber security in our personal lives.

  • 2018 11 11 Whats wrong with ITIL V3 IMAGE
    What's wrong with ITIL V3?

    What’s wrong with ITIL V3, and why do we need ITIL 4?

Latest Tweets