Skip main navigation

Risk management of threats

Every organisation needs to be prepared for risks so it is vital to have an effective risk management process. We need to first consider what risk management is. The Institute …

Different perspectives

You have now read about four different cyber attacks that have happened in UK local government in recent years. Hopefully this has given you a chance to consider some of …

Feedback to scenarios

Having considered the risks and motives in previous steps, as well as your own experiences of cyber crime and cyber attacks, have a read of the following four case studies: …

Cyber threats & Responsibilities

Organisations should understand that cyber risks are inevitable and hence have to adopt a holistic approach to managing them. In addition to developing a robust IT infrastructure, care has to …

Risks

Most organisations and businesses today rely on IT systems for storing company and client information. They invest heavily in secure IT infrastructure to protect these data assets. While there are …

How are companies affected?

Continuing our look into the impact of cyber crime the report by the Centre for Strategic and International Studies (CSIS) (Lewis 2018) gives a rather concerning insight into the rise …

How big is the problem?

So, how big a problem is this? In July 2019 the UK governmental Department for Digital, Culture, Media & Sport released its Cyber security breaches survey 2019 report, a report …

Types of attackers

As the world embraces more digital and hyperconnected components, opportunities and paths become more numerous for attackers to gain access to our most sensitive information. Data breaches have become commonplace, …

Cyber threat: malware

A cyber threat, or cyber security threat, is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats are a big deal. …

Cyber threat: ransomware

So what is ransomware? For £5,000 I’ll tell you… That’s the key principle – it’s about holding information of value to you and only releasing this information in exchange for …

Data breaches

“Nearly 9 out of 10 large organisations surveyed now suffer some form of security breach – suggesting that these incidents are now a near certainty. Businesses should ensure they are …

Cyber security and your responsibilities

A growing number of entities that we interact with online collect and process our personal data, including online retailers, internet service providers, employers, banks, credit card companies, etc. Organisations use …

The cyber security landscape

Welcome to our course on the cyber security landscape, where we will explore cyber security management and look at the risks facing individuals and organisations. Cyber attacks and threats are …

The cyber security landscape

Welcome to our course on the cyber security landscape, where we will explore cyber security management and look at the risks facing individuals and organisations. Cyber attacks and threats are …

Risk Management of Threats

Every organisation needs to be prepared for risks so it is vital to have an effective risk management process. We need to first consider what risk management is. The Institute …