Skip main navigation

Different perspectives

You have now read about four different cyber attacks that have happened in UK local government in recent years. Hopefully this has given you a chance to consider some of …

Feedback to scenarios

Having considered the risks and motives in previous steps, as well as your own experiences of cyber crime and cyber attacks, have a read of the following four case studies: …

Where do cyber threats come from?

Organisations should understand that cyber risks are inevitable and hence have to adopt a holistic approach to managing them. In addition to developing a robust IT infrastructure, care has to be …

Risks

Most organisations and businesses today rely on IT systems for storing company and client information. They invest heavily in secure IT infrastructure to protect these data assets. While there are …

How big is the problem?

In July 2019, the UK governmental Department for Digital, Culture, Media & Sport released its Cyber security breaches survey 2019 report, which ‘is a quantitative and qualitative survey of UK …

How are companies affected?

Continuing our look into the impact of cyber crime the report by the Centre for Strategic and International Studies (CSIS) (Lewis 2018) gives a rather concerning insight into the rise …

What is a Ransomware?

So what is ransomware? For £5,000 I’ll tell you… That’s the key principle – it’s about holding information of value to you and only releasing this information in exchange for …

Data breaches

“Nearly 9 out of 10 large organisations surveyed now suffer some form of security breach – suggesting that these incidents are now a near certainty. Businesses should ensure they are …

Cyber security and your responsibilities

A growing number of entities that we interact with online collect and process our personal data, including online retailers, internet service providers, employers, banks, credit card companies, etc. Organisations use …

Getting the most out of your learning

Courses in ExpertTracks may be assessed using either: Peer Graded Assignments, Tests, or a combination of both. Peer Graded Assignment steps have been designed specifically for ExpertTracks to provide you …

Risk management of threats

Every organisation needs to be prepared for risks so it is vital to have an effective risk management process. We need to first consider what risk management is. The Institute …

Different perspectives

You have now read about four different cyber attacks that have happened in UK local government in recent years. Hopefully this has given you a chance to consider some of …