Profile cover photo
Profile photo
Ascentor
1 follower -
Ascentor are Information Risk Management and Cyber Security specialists.
Ascentor are Information Risk Management and Cyber Security specialists.

1 follower
About
Posts

Post has attachment
Traveling with your usual devices this summer? Using airport and hotel Wi-Fi?Taking your mobile to the beach - what could possibly go wrong? https://www.ascentor.co.uk/2018/07/ascentor-guide-cyber-safe-summer-holiday/
Add a comment...

Post has attachment
Obtaining Cyber Essentials PLUS is good for your organisation and customers. We share some of our preparation tips and give an insight into our process.
http://www.ascentor.co.uk/2018/06/pass-cyber-essentials-plus-first-time/
Add a comment...

Post has attachment
We discuss the risk implications of OT’s potential exposure to cyber threats and the need for OT and IT experts to come together with security to understand and tackle such risks.
https://www.ascentor.co.uk/2018/04/ot-debate-critical-infrastructure-safe/
Add a comment...

Post has attachment
A discussion on the security challenges of #DigitalTransformation, how they can be addressed more simply - and from the beginning. https://www.linkedin.com/pulse/digital-transformation-how-remove-security-risk-dave-james/
Add a comment...

Post has attachment
What to consider when reviewing, choosing and managing a data processor so that they meet the requirements of Article 28 #GDPR https://www.ascentor.co.uk/2018/03/choosing-managing-data-processors-comply-gdpr/
Add a comment...

Post has attachment
The NIS Directive is being transposed into national law on 9th May. We answer some of the questions you might have and cover how to comply. https://www.ascentor.co.uk/2018/02/nis-directive-explained-compliance-guidance/
Add a comment...

Post has attachment
Patching is meant to fix security vulnerabilities - but it can sometimes go wrong. What happens then? With specific advice for SMEs https://www.ascentor.co.uk/2018/01/patch-wrong/
Add a comment...

Post has attachment
Ascentor take an introductory look at the use of metrics to measure cyber security effectiveness with dashboards and benchmarking.

https://www.ascentor.co.uk/2018/01/measuring-understanding-cyber-security-effectiveness/
Add a comment...

Post has attachment
Join us for a look back at some of the cyber security issues and incidents Ascentor covered in 2017. But what will dominate 2018?

https://www.ascentor.co.uk/2017/12/look-back-cyber-security-2017/
Add a comment...

Post has attachment
GDPR: We take a look at the options around consent and the legality of processing data.

https://www.ascentor.co.uk/2017/11/gdpr-regulation-require-capturing-consent/
Add a comment...
Wait while more posts are being loaded