Services
Achieve cyber security compliance & ISO certification
Active threat detection and assessment services
Cyber Essentials and Cyber Essentials Plus certification
Get in touch
Learn how we can support your cyber security challenges
Resources
Access our expert guides and checklists
Industry insights, views and articles
Latest events and updates from Ascentor
About Us
Join Ascentor – our current vacancies
Discover our cyber security accreditations
Learn more about our Partners
Learn more about working with Ascentor
Learn more about Ascentor and our heritage
Meet our team of accredited cyber security experts
We’re on your side – discover our business values
Contact Ascentor
Read what our clients are saying
Stay ahead of cyber security and management system trends. Access our latest in-depth guides, checklists, industry insights and articles created to ensure your organisation is informed and up-to-date.
Home » Resources » Page 10
In this article we focus on Ransomware and larger enterprises, who often have more sophisticated IT environments and, potentially, a lot more data at risk.
Good cyber security within digital transformation programmes is key – we explore why and suggest an approach to ensure simpler addressing of security challenges.
The £1.9bn new strategy will also help enlarge specialist police units that tackle organised online gangs and help educate and train cyber security experts.
In this article we look at what Building Information Modelling (BIM) is and then discuss the kind of data at risk in a building project.
We look at how to manage BIM implementation and why managing the risks to building information doesn’t stop at the end of the build.
In this article we summarise the main aspects of GDPR, and what it will mean for the way organisations must manage their data.