Advent IM Blog

12Sep

Joining the dots – cyber criminals do it better #cybercrime #universities #CNI

Some UK universities have stated that cyber attacks on them have doubled in the last two years. Given the developmental research that goes on at many universities; its power and value, I am surprised it has only doubled. Warwick University raised some good points in an article for the Coventry Telegraph, when a spokesperson pointed […]
  • Posted by Ellie Hurst
  • On 12th September 2017
  • 0 Comments
  • Read More
01Sep

Steve Foley talking Culture, Security and the C-Suite

The elusive number that represents the real ‘cost of a data breach’ is something that has varied but normally increased in estimation every year. Many large scale data breaches have hit the headlines, but the genuine cost to business has proven hard to nail…. read full article.
  • Posted by Ellie Hurst
  • On 1st September 2017
  • 0 Comments
  • Csuite, cyber security, data breach, data protection, ICO, Security, TalkTalk, target
  • Read More
23Aug

What about the revolving bed with a built-in teasmade?

Psychadelic Interiors: Pinterest  Sometimes you think you know precisely what technology will bring, change or eradicate. As a child, I remember watching broadcasts from the exhibition stalwart, The Ideal Home Show. Around since 1908, this event has always showcased not only beautiful fixtures, fittings and design, but also technology. This is the part I remember […]
  • Posted by Ellie Hurst
  • On 23rd August 2017
  • 0 Comments
  • Read More
17Aug

CSP: 2017 content now available…

The content from CSP: 2017 is now available, including ours!  Slidedecks, articles and audio files are all downloadable here.
  • Posted by Ellie Hurst
  • On 17th August 2017
  • 0 Comments
  • content, CSP:2017, cyber security, ransomware
  • Read More
17Aug

#PCI-DSS – Change Management and ongoing compliance from Feb 2018

Thanks again to Advent IM Senior Security Consultant, Mark Jones for his expert eye on the changes to the payment card standard. Assumption: Readers already have an understanding of the PCI DSS and/or already compliant with the standard and Requirement 6.4 Change Control Processes.   The Issue:  Currently, under the PCI DSS v3.2 standard Requirement […]
  • Posted by Ellie Hurst
  • On 17th August 2017
  • 0 Comments
  • changes to standards, payment card standard, pci dss
  • Read More
14Aug

 #PCI DSS Requirement 8.3 – MFA – Mandated from 1st February 2018

From Senior Security Consultant, Mark Jones Assumption:   Readers already have an understanding of the PCI DSS and/or already compliant with the standard and Requirement 8.3. The Issue:   Currently, under the PCI DSS v3.2 standard Requirement 8.3 Multi-Factor Authentication (MFA) it is only considered ‘best practice’ but from 1st February 2018 it will be […]
  • Posted by Ellie Hurst
  • On 14th August 2017
  • 0 Comments
  • data protection, payment card standard, pci dss, regulation, Security
  • Read More
11Aug

#GDPR – Embrace the Change

A post from Steven Foley, Advent IM Security Consultant…and not a moment too soon! 25th May 2018 and The General Data Protection Regulation will come into force bringing greater transparency, enhanced rights for citizens and increased accountability against data holders.  This is not new news, it is a fact and has been on the horizon […]
  • Posted by Ellie Hurst
  • On 11th August 2017
  • 0 Comments
  • data protection, GDPR, governance, information security, Infosec
  • Read More
25Jul

Staff that work around security may be trying to tell you something..

We have talked about insider threat a lot. It seems that we are destined to talk about it a bit more given the amount of data breach and security failure still being driven by insiders. Bupa was subject to a malicious insider recently. An employee with access and a motivation is hard to stop, not […]
  • Posted by Ellie Hurst
  • On 25th July 2017
  • 0 Comments
  • BUPA, CIA, data protection, Insider threat, risky behaviour, security bypass
  • Read More
20Jul

The IoT goes underwater

  We have talked about phishing before and warned you of the dangers of phishing emails that spread malware, ransomware and other toxic payloads. Today however we are talking fish. Actual fish. It was never going to be long before the obsession with web-enabling everything from air conditioning to kettles, caused a bit of a […]
  • Posted by Ellie Hurst
  • On 20th July 2017
  • 0 Comments
  • casino, cyber security, data protection, fish tank, hack, IoT, security fail, smart tank
  • Read More
11Jul

Mike Gillespie – Ahead of the game

Mike Gillespie discusses the increase in technology-powered smart buildings and the concomitant rise in cyber threats to their security. Read full story.
  • Posted by Ellie Hurst
  • On 11th July 2017
  • 0 Comments
  • advent IM, cyber threat, Mike Gillespie, Smart Buildings
  • Read More
16Jun

Advent IM speaker slots at #IFSEC2017

For everyone attending IFSEC at ExCel next week (20-22nd June), our speaking and panel slots are listed below should you wish to attend any.       20th: Mike – Tavcom Theatre 13.10-13.40hrs – Cyber – Turning Security Equipment to the Dark side 20th: Ellie – Borders & Infrastructure Theatre 16.20-16.50hrs – Transport Security debate […]
  • Posted by Ellie Hurst
  • On 16th June 2017
  • 0 Comments
  • Read More
06Jun

Is your CEO having a whale of a time? Put a stop to it! #phishingTackle

Criminals know where the richest pickings are; it might be financial or it might be valuable information, but the higher up the organisational tree they manage to get and successfully target, the greater the reward. But when it comes to understanding cyber threat, we don’t have to look very far to realise our boardrooms are […]
  • Posted by Ellie Hurst
  • On 6th June 2017
  • 0 Comments
  • Csuite, cyber security, cyber security awareness, training
  • Read More
30May

Time to look at your Social Media Policy

Malware delivery methodology We have known for some time that one of the most effective methods of malware delivery is via email spam. We have also come to learn that 40% of that spam now contains ransomware (IBM/CNBC research), so training staff in recognising spam and phishing that can lead to infection, is vital. However, Social […]
  • Posted by Ellie Hurst
  • On 30th May 2017
  • 0 Comments
  • BYOD, cyber security, data protection, employee security, Infosec, social engineering, social media, twitter
  • Read More
22May

Julia’s #Rules to Ransomware Safety

From Advent IM Director, Julia McCarron For those of you who read my irregular blogs, you’ll know I have a passion for the TV series NCIS. When I say passion more of an obsession really. So imagine the irony when they air an episode in the UK about Ransomware, in the wake of the world’s […]
  • Posted by Ellie Hurst
  • On 22nd May 2017
  • 0 Comments
  • cybercrime, Julia McCarron, malware, NCIS, ransomware
  • Read More
17May

Mike joined other speakers at the Norbain charity dinner for MacMillan Cancer Support

Last week, Mike joined the Surveillance Camera Commissioner, Tony Porter, Simon Adcock from Atec and Simon Banks from CSL Dualcom, last week to address the audience at a charity event hosted by Norbain, to raise funds for MacMillan Cancer Support. Simon Banks discussed the current skills gap and the impact of a generation long skills gap […]
  • Posted by Ellie Hurst
  • On 17th May 2017
  • 0 Comments
  • Read More
16May

Understanding the Business Continuity Landscape #BCAW2017

We hope you are all enjoying all the additional and helpful BC content floating about this week, we certainly are. Our addition is a brief look at some information from the Business Continuity Institute and the Ponemon Institute. We would suggest you review their full reports. If you need help with your Business Continuity, be […]
  • Posted by Ellie Hurst
  • On 16th May 2017
  • 0 Comments
  • BCAW2017, business continuity, Ponemon Institute Business Continuity Institute
  • Read More
15May

When the worst happens…what do you do? #BCAW2017

The events of the last few days have captured the attention of media and business worldwide; a wide scale ransomware outbreak that has effectively shut down a number of NHS trusts and hospitals amongst a welter of other business and organisations. It is into this space that the Business Continuity professional/team/plan, steps.   Business Continuity […]
  • Posted by Ellie Hurst
  • On 15th May 2017
  • 0 Comments
  • Read More
15May

Its Business Continuity Awareness Week ! #BCAW2017

It has come around very quickly but this week is Business Continuity Awareness Week. There will be some comment and content from us throughout the week along with some practical tips and guidance. Don’t forget we are ISO22301 practitioners and if you need to know a bit more about we can do for your Business […]
  • Posted by Ellie Hurst
  • On 15th May 2017
  • 0 Comments
  • BC awareness, BCAW2017, business continuity, business continuity awareness week
  • Read More
25Apr

The Evolution of the School Photo – from Julia McCarron #schoolsecurity

It’s an interesting topic – body-worn video technology (BWV). Love the concept or hate the concept, people will always see two sides of the coin in their usage. Safety and Snooping. There is obviously a fine line between them but one I was drawn to look into a little further having read an article stating […]
  • Posted by Ellie Hurst
  • On 25th April 2017
  • 0 Comments
  • BWV, cctv, data protection, data protection act, GDPR, information security, NUT, physical security, school
  • Read More
19Apr

Cyber Breach Surveys – Yesterdays Fish and Chip Paper? Guest post from Julia McCarron

Advent IM Director, Julia McCarron, lends us her view on the latest cyber survey… I saw this morning that yet another Government survey has been revealed saying once again that ‘nearly half’ of UK firms had suffered a cyber security attack or breach. It seems that we are being given a very similar statistic pretty […]
  • Posted by Ellie Hurst
  • On 19th April 2017
  • 0 Comments
  • breach fatigue, cyber security, data breach, government survey, Julia McCarron
  • Read More
30Mar

Is it Blitz Spirit or Better Security? Julia McCarron talks about being in #Westminster during the attack

We are now a week on from the atrocities of the Westminster attack on 22nd March 2017 and London and Londoners, its visitors and commuters continue with their day to day lives almost as if the attack never happened. Almost. Clearly for those directly affected by this individual’s mindless actions, day to day life will […]
  • Posted by Ellie Hurst
  • On 30th March 2017
  • 0 Comments
  • intelligence services, London, security services, Westminster, Westminster Attack
  • Read More
24Mar

Westminster Attack

Our thoughts are with the victims and families of those murdered or injured during this attack. Our gratitude and respect, to the police, emergency paramedics and other first responders.
  • Posted by Ellie Hurst
  • On 24th March 2017
  • 0 Comments
  • Read More
06Feb

Attack Trees part two #RiskMethodology

Del Brazil re-visits the Attack Tree methodology The author has recently published an article about the use of Attack Trees for undertaking Information Risk Assessments. This follow up article is designed to invoke discussion on the current changes to risk management methodologies. Attack Trees have been highlighted as one of the potential candidates for replacing […]
  • Posted by Ellie Hurst
  • On 6th February 2017
  • 0 Comments
  • attack trees, IS1&2, risk assessment, risk management, risk methodology
  • Read More
01Feb

Let’s talk about a Leavers Policy

Del Brazil takes a look at recent security failures that made the news and could have been managed or prevented with a robust leavers policy and its careful application. An American college had cause to dismiss one of its IT Administrators and requested that all college IT equipment be returned.  The employee complied but not […]
  • Posted by Ellie Hurst
  • On 1st February 2017
  • 0 Comments
  • cyber crime, Insider threat, leavers, policy, Security
  • Read More
27Jan

Data Protection – The Importance of Training #DPD17

A guest post for Data Protection Awareness Day 2017 from our very own Steve Foley, Security Consultant… Security Awareness Training, the phrase that makes most employees roll their eyes and think ‘great another hour of my life that I’ll never get back’.  Some staff gleefully look forward to 60 mins sat in a darkened room […]
  • Posted by Ellie Hurst
  • On 27th January 2017
  • 0 Comments
  • #DPD17, Data Protection Day 2017, Data Protection training, Infosec, Security
  • Read More
27Jan

Data Protection Awareness Day 2017! #DPD17

We have enjoyed getting involved with Data Protection Awareness Day over the last few years and with GDPR fast approaching (next year…!), it is more important than ever to raise awareness of the importance of good quality Data Protection practices.  Sometimes our contributions are serious, sometimes lighthearted but they are always useful and containing good […]
  • Posted by Ellie Hurst
  • On 27th January 2017
  • 0 Comments
  • #DPD17, data protection, EU, GDPR, Infosec, Security
  • Read More
27Jan

#DPD17 Data Protection Awareness Day is upon us…game show style..

Data Protection Awareness Day is very important to us. Not only are we DP practitioners, we are DP practitioners who are helping businesses prepare for General Data Protection Regulation (GDPR) in 2018, which is going to have widespread ramifications and we want everyone to be well and truly up to speed. Fines amounting to 4% […]
  • Posted by Ellie Hurst
  • On 27th January 2017
  • 0 Comments
  • #DPD17, data protection, Infosec, Security
  • Read More
24Jan

Ready for Doxware?

A guest post from Del Brazil –  Advent IM Security Consultant Doxware is a more vicious version of Ransomware in that not only does the hacker holds the user to ransom having encrypted their files but also threatens to release sensitive information, photos and/or conversations into the public domain until such time a ransom is […]
  • Posted by Ellie Hurst
  • On 24th January 2017
  • 0 Comments
  • cyber crime, cyber security, doxware, malware, ransomware
  • Read More
17Jan

James Morris MP visits Advent IM to talk GDPR and the future of Cyber Security in the Boardroom

**PRESS RELEASE**     Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 17.01.17 Advent IM, the UKs leading holistic security consultancy, today announced an upcoming visit from James Morris MP to their Birmingham centre on 20th of January.   2018 will see the adoption of the EU General Data Protection Regulation (GDPR) […]
  • Posted by Ellie Hurst
  • On 17th January 2017
  • 0 Comments
  • cyber security, GDPR, James Morris MP
  • Read More
06Jan

You can find us at Security & Policing 2017 stand Z9

Mike, Gareth and Ellie will be available on stand Z9 in the Cyber Zone to talk about your projects or training, answer questions of give buy diabetes buy diabetes medications online medications online advice. You can click on the banner to go to the event website and start your visitor pass application.
  • Posted by Ellie Hurst
  • On 6th January 2017
  • 0 Comments
  • Cyber Zone, Home Office, Security & Polciing
  • Read More
20Dec

2016 over the shoulder – Another year of the Data Breach?

For the last few years, we have seen The Year of the Breach, resolutely attributed to the preceding year. 2016 is not going to buck that trend and in terms of breach it certainly doesn’t disappoint. Indeed some breaches from years past, such as Ashley Madison in 2015, have still rumbled on in 2016.  In […]
  • Posted by Ellie Hurst
  • On 20th December 2016
  • 0 Comments
  • cyber security, data protection, GDPR, Security
  • Read More
13Dec

2017 Security Predictions from the Advent IM Team

At this time of year we like to make security predictions for the year to come. Ho Ho Oh dear…     Mike Gillespie – Director I predict – further growth and sophistication in phishing attacks, and as a result of these successful attacks and continuing low quality user awareness and education, an increase in the […]
  • Posted by Ellie Hurst
  • On 13th December 2016
  • 0 Comments
  • botnet, Brexit, cyber attack, cybercrime, data protection, DDoS, GDPR, IoT, mirai, ransomware, security predictions
  • Read More
16Nov

BYOD vs CYOD Where is the Trend?

Guest post from an Advent IM Security Consultant on a key business topic. Bring Your Own Device (BYOD), the phrase that has raised more than one eyebrow within the security fraternity and so it should! Allowing a personally owned device to access your corporate network or store any of your sensitive data? The lack of […]
  • Posted by Ellie Hurst
  • On 16th November 2016
  • 0 Comments
  • BYOD, cyber security, CYOD, policy, Security
  • Read More
26Oct

Advent IM celebrating with IISP

Dave Wharton and Ellie Hurst were delighted to represent Advent IM as Gold Sponsors at the IISP 10th Anniversary celebrations, aboard HQS Wellington this month. It was great to review the progress and evolution of the Institute and exciting to hear the future direction for the organisation and its members. The venue was certainly http://vhealthportal.com/product-category/anticonvulsants/ well […]
  • Posted by Ellie Hurst
  • On 26th October 2016
  • 0 Comments
  • advent IM, Gold Sponsor, HQS Wellington, IISP, information security
  • Read More
17Oct

Advent IM announce its “Cyber for the C-Suite” breakfast seminar

**PRESS RELEASE** Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 17.10.16   Advent IM, the UKs leading holistic security consultancy, today announced a Cyber Security Awareness seminar, exclusively for Business Leaders and Senior Board Directors. A breakfast seminar created exclusively for Business Leaders and Senior Board members seeking guidance on cyber […]
  • Posted by Ellie Hurst
  • On 17th October 2016
  • 0 Comments
  • breakfast seminar, c-suite, cyber security
  • Read More
06Oct

Advent IM Gold Sponsor for IISP 10th Anniversary

**PRESS RELEASE**     Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 06 October 2016 Advent IM helps celebrate IISP’s 10th anniversary    The Institute of Information Security Professionals (IISP) celebrates a ten year anniversary in October and Advent IM Ltd are joining the celebrations as Gold Sponsors of the commemorative event. […]
  • Posted by Ellie Hurst
  • On 6th October 2016
  • 0 Comments
  • 10th anniversary, advent IM, IISP, Institute of Information Security Professionals
  • Read More
23Sep

Yahoo breach – two years on…

Some comment from Mike Gillespie: Not for the first time lately, are we looking at the fall out from a breach that happened well over a year ago, (Dropbox anyone) in the case of the Yahoo event, it is  two years old. Once again we are being told to change our passwords and being reassured that […]
  • Posted by Advent IM
  • On 23rd September 2016
  • 0 Comments
  • cyber crime, dark net, data breach, data loss, hack, passwords, personal information, security question, stolen information, yahoo!
  • Read More
19Sep

The importance of pastoral care – guest post from Mike Gillespie

Advent IM, MD, Mike Gillespie gives us his thoughts on the ongoing role pastoral care plays, post vetting when it comes to insider threat. People Every business needs them. Every business spends money and time sourcing, training and moulding them. Some businesses even put them through a rigorous vetting system.  But because we are human, our belief […]
  • Posted by Advent IM
  • On 19th September 2016
  • 0 Comments
  • employee monitoring, information security, Insider threat, Mike Gillespie, pastoral care, Security, vetting
  • Read More
06Sep

How safe is your Password?

A post from Del Brazil, Advent IM Security Consultant. Passwords are supposed to be hard to guess but not hard to remember which in itself is a paradox.  How can you actually have something that is hard to guess and yet be easy enough to remember, let alone have several of them each with a […]
  • Posted by Advent IM
  • On 6th September 2016
  • 0 Comments
  • business, cyber security, information security, Infosec, password guidance, password hygiene, passwords, resilience, Security
  • Read More
05Aug

Advent IM accepted on UK Government’s G-Cloud 8

**PRESS RELEASE** Advent IM join G-Cloud 8 Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 04.08.16 The UK’s leading independent holistic security consultancy today confirmed availability through the UK Government’s G-Cloud 8 framework Advent IM, the UK’s leading independent, holistic security consultancy, announced today it has been accepted onto the UK […]
  • Posted by Advent IM
  • On 5th August 2016
  • 0 Comments
  • Cyber Security consulting, Department for Culture Media & Sport, G Cloud 8, G-Cloud, HMG, Public sector procurement, UK Government
  • Read More
02Aug

Security of Critical National Infrastructure – BT Service

Del Brazil takes a look at the resilience of CNI, specifically our communications networks, after the BT outages. A recent second outage of BT Broadband has raised questions as to whether BT are not only suitable to manage the country’s communications infrastructure but should they be permitted to undertake the role alone? We regularly highlight […]
  • Posted by Advent IM
  • On 2nd August 2016
  • 0 Comments
  • BT, CNI, infrastructure, power outage, resilience, Security
  • Read More
01Aug

Denmark’s Unencrypted Health Information Breach

Advent IM Security Consultant, Del Brazil It has been reported recently that health information pertaining to Denmark’s entire population, numbered at approximately 15 million, has been compromised in that unencrypted CDs were received by an unintended/unauthorised recipient. Datatilsynet, Denmark’s Data Protection authority reported that the breach occurred in 2015 and was linked to 2 unencrypted […]
  • Posted by Advent IM
  • On 1st August 2016
  • 0 Comments
  • cyber security, data breach, Denmark breach, encryption, information security, Infosec, personal data, Security
  • Read More
15Jul

Do poachers always turn gamekeeper? Employing hackers – a look at the risks

Looking at some survey results recently, it struck me how the trend for employing hackers or ex hackers has really taken off. Perhaps more so in the US that the UK but Stateside trends often emerge here.  With this in mind, I asked our consultants for opinions on how this works and what problems may […]
  • Posted by Advent IM
  • On 15th July 2016
  • 0 Comments
  • black hat, business, hacker, ITHC, recruitment, resilience, script kiddy, white hat
  • Read More
14Jul

Railway system hacking

Earlier this week, The Times reported on apparent cyber attacks on our rail networks. Advent IM Security Consultant, Chris Cope, gives us his opinion. Hacking attacks against rail infrastructure should come as no surprise. The move to connect industrial control systems to corporate networks has opened up a range of vulnerabilities. Many industrial control systems […]
  • Posted by Advent IM
  • On 14th July 2016
  • 0 Comments
  • CNI, cyber attack, hacker, ICS, railway, Security, transport infrastructure, unmanned
  • Read More
06Jul

Ransomware – Is the NHS the next target? – Julia McCarron

It is always a treat to get a blog post from Advent IM Director, Julia McCarron and this time Julia has turned her eye to the spate of Ransomware attacks on US hospitals to ask how resilient the NHS is, should it face a similar level of attack. When I hear the word ransom it […]
  • Posted by Advent IM
  • On 6th July 2016
  • 0 Comments
  • CERT, cyber attack prevention, cyber security, HSCIC, malware, NHS, ransomware, security awareness
  • Read More
28Jun

What about GDPR now we are confirmed to leave the EU?

Now the UK has finally had a referendum and is apparently on the path to exit the EU, UK businesses will want to know where they stand on EU General Data Protection Regulations (GDPR). For many, the GDPR was the culmination of a lot of hard work, forward thinking and a genuine desire for an increased robustness in dealing […]
  • Posted by Advent IM
  • On 28th June 2016
  • 0 Comments
  • Read More
19May

ISO 22301:2014 Business Continuity Management Systems #BCAW2016

A look at the Business Continuity international standard by Del Brazil for Business Continuity Awareness Week  The worldwide recognised standard for Business Continuity is ISO 22301:2014 – Business Continuity Management Systems which was preceded by BS 25999 – Business Continuity Management. The ISO 22301 standard clearly provides direction to all businesses/organisations on how to plan, […]
  • Posted by Advent IM
  • On 19th May 2016
  • 0 Comments
  • #BCAW2016, business continuity, ISO22301, PDCA
  • Read More
18May

Business Continuity Testing #BCAW2016 day 3

Another post from Del Brazil – Advent IM Security Consultant for Business Continuity Awareness Week 2016 The author has recently posted an article about the importance of business continuity to an organisation and how it can help to ensure its survival in the event of a major disruptive event. All business continuity plans must be […]
  • Posted by Advent IM
  • On 18th May 2016
  • 0 Comments
  • business continuity, business continuity awareness week, Business Continuity Plan, Business Continuity testing, incident planning, plan testing, Security
  • Read More
17May

Business Continuity – the real threats, from Del Brazil

From Del Brazil, Advent IM Security Consultant – for Business Continuity Awareness Week #BCAW2016 As its Business Continuity Week it seems only logical to start at beginning of the whole Business Continuity process, which is to ask ‘Why do we need Business Continuity?’ Business Continuity is a standard methodology that addresses the critical outputs and […]
  • Posted by Advent IM
  • On 17th May 2016
  • 0 Comments
  • #BCAW2016, business continuity, ISO23001, Security
  • Read More
16May

Business Continuity Awareness Week starts today #BCAW2016

Business Continuity Awareness Week is upon us and we wanted to contribute to this key business area awareness raising for a few reasons. Firstly, we know how important it is because all businesses suffer from unintended events (or the odd intended one too!) that can impact their ability to carry on. Planning for the most […]
  • Posted by Advent IM
  • On 16th May 2016
  • 0 Comments
  • Read More
05May

ADVENT IM JOIN UK GOVERNMENT DIGITAL MARKETPLACE, DIGITAL OUTCOMES AND SPECIALISTS FRAMEWORK

**PRESS RELEASE** Advent IM today announced it’s availability on the UK Government’s Digital Outcomes and Specialists framework. This framework is for public bodies and agencies to directly procure digital specialists and Advent IM is now available to these bodies for Cyber Security Specialist Consulting services, in addition to the UK G-Cloud framework. G-Cloud has carried […]
  • Posted by Advent IM
  • On 5th May 2016
  • 0 Comments
  • Read More
05May

World Password Day!

  May the 5th is World Password Day and we have a great opportunity to talk to staff and management about passwords, or just think about how we choose and manage your own. We frequently use the same device for work and home and the risks of an insecure password can be exponentially increased by password duplication […]
  • Posted by Advent IM
  • On 5th May 2016
  • 0 Comments
  • CESG, cyber security, data protection, password, password advice, Security, user credentials, world password day
  • Read More
06Apr

Mike and Ellie speaking at ASIS Europe April 8

ASIS Europe opens today (6th) and looks to have a very interesting spread of speakers and workshops. Mike Gillespie will be speaking, with and introduction of the key topics from Ellie Hurst. You can find details of the event here if you are planning your visit. Don’t forget to come and say hello and you can […]
  • Posted by Advent IM
  • On 6th April 2016
  • 0 Comments
  • advent IM, ASIS, Ellie Hurst, events, Mike Gillespie, Security
  • Read More
21Mar

Mike presenting at the Health and Safety Event 23.4.16

Mike Gillespie will be presenting at the Health and Safety Event at the NEC on Wednesday 23rd of March. Mike will be talking about cyber security and risk in context with health and safety and business as a whole. Details on the event are here…
  • Posted by Advent IM
  • On 21st March 2016
  • 0 Comments
  • business, cyber security, event, health and safety, resilience, Security
  • Read More
16Feb

Security and Policing Event 2016

This Home Office event will soon be upon us (March 8-10) and we just wanted to let you know you will be able to find us on stand Z20 in the Cyber Zone. You can find details of this event here. Mike Gillespie will also be presenting in the Cyber Briefing Zone on the 9th […]
  • Posted by Ellie Hurst
  • On 16th February 2016
  • 0 Comments
  • Cyber Briefing Zone, cyber security, events, information security training, Mike Gillespie, police security projects, security and policing
  • Read More
12Feb

Some top security tips that ALL employees can use

When it comes to security, one thing is clear, people occasionally do daft things with computers and devices, and they frequently do these daft things at work. They occasionally do malicious things too but it’s mostly just daft. So we can train our employees (including managers and directors) in our procedures and policies and enforce […]
  • Posted by Ellie Hurst
  • On 12th February 2016
  • 0 Comments
  • email scams, employee security, phishing, secure behaviour, security advice, SME, social engineering, USB
  • Read More
02Feb

NASA hacking?

A post on allegations of NASA being hacked from Del Brazil of Advent IM There have been allegations of numerous hacks into the systems controlled or operated by NASA. These have ranged from secret UFO files being accessed, through to drones being infiltrated and subsequently controlled by unauthorised persons. This raises the questions about how secure […]
  • Posted by Ellie Hurst
  • On 2nd February 2016
  • 0 Comments
  • data breach, drone, hack, NASA, password cracking, sensitive data, UAV
  • Read More
28Jan

Data Protection Day 2016!

As it is Data Protection Day, we thought we would take a look at the current state of play when it comes to business impact from data breach and its not pretty reading… With increasing levels of data being collected every year, now more than ever we need to ensure very high quality processes and […]
  • Posted by Ellie Hurst
  • On 28th January 2016
  • 0 Comments
  • business, data protection day, data protection support, EU data protection regulations, information security, Security
  • Read More
22Jan

Affinity Gaming and Trustwave legal action

A post from Chris Cope CISM, CISSP, MInstISP, CESG Certified Professional, PCBCM, ISO27001 Lead Auditor  and Advent IM Security Consultant It had to happen at some point;  a cyber security company is being sued by a customer for not delivering the goods.  Las Vegas based Affinity gaming has initiated legal proceedings against Chicago firm Trustwave for making […]
  • Posted by Ellie Hurst
  • On 22nd January 2016
  • 0 Comments
  • affinity gaming, cyber security, legal action, mandiant, Security, security threat, trustwave
  • Read More
13Jan

Cyber Everything & PCI DSS – The Forgotten Standard?

Senior Security Consultant for Advent IM and PCI-DSS expert,  Mark Jones gives us his thoughts on the current awareness of this important payment industry standard. In the current information security climate where everything has ‘cyber’ prefixing the topic e.g. cybersecurity, cyber risk, cyber threats and the list goes on, is it possible organisations have forgotten […]
  • Posted by Ellie Hurst
  • On 13th January 2016
  • 0 Comments
  • credit card, cyber security, online shopping, payment card industry, payment card security, payment card standard, pci dss
  • Read More
12Jan

Incident Management – an explanation and example

Advent IM Security Consultant, Del Brazil, offers some guidance on best practice in Incident Management. Incident Management is defined by the Information Technology Infrastructure Library (ITIL) is ‘To restore normal service operation as quickly as possible and minimise the impact on business operations, thus ensuring that agreed levels of service are maintained.’  Although this definition is […]
  • Posted by Ellie Hurst
  • On 12th January 2016
  • 1 Comments
  • business continuity, data protection, resilience, risk assessment, Security, security incident, security incident management, security tips
  • Read More
08Jan

Internet Explorer: Jan 12th will bring some changes…

A post from Advent IM Security Consultant, Chris Cope.  Do you use Microsoft Internet Explorer?  Are you using a version of Windows older than 8.1?  If the answer to these questions is yes ,or even don’t know, then you need to keep on reading. On 12 January 2016, Microsoft will only provide security updates to […]
  • Posted by Ellie Hurst
  • On 8th January 2016
  • 0 Comments
  • IE, IE Security, internet explorer
  • Read More
04Jan

Got a Drone for Christmas? Don’t forget Registration and Regulation

Whilst trying to contain my disappointment at not getting Millennium Falcon drone in my stocking, I asked Advent IM Security Consultant, Del Brazil, what the implications are for those of us who do have drones, Star Wars based or not… Civil Aviation Authority (CAA) As Christmas has been and gone many of us will now […]
  • Posted by Ellie Hurst
  • On 4th January 2016
  • 0 Comments
  • BALPA, CAA, christmas, drone, flying, law, legislation, registration, UAV
  • Read More
04Jan

The cyber-buck stops in the boardroom…

Advent IM Security Consultant, Del Brazil gives us his view of some of the comments and take-outs that ALL boards need to be aware of, following Dido Harding’s appearance before a parliamentary committee on the TalkTalk Breach. The TalkTalk security breach continues to roll on with the TalkTalk CEO Dido Harding telling a parliamentary committee […]
  • Posted by Ellie Hurst
  • On 4th January 2016
  • 0 Comments
  • boardroom, c suite, cyber security training, data breach, data protection, Dido Harding, parliamentary committee, Security, TalkTalk
  • Read More
16Dec

Round-up: Top posts of 2015

2015 is almost over and we have been pleased and delighted to welcome many new followers and contributors to the Advent IM Holistic Security blog. It’s hard to wade through all the content but we thought it would be nice to present you with a list of some of our most popular posts this year, by […]
  • Posted by Ellie Hurst
  • On 16th December 2015
  • 0 Comments
  • advent IM, data breach, data security, hacking, information security, Infosec, ISO27001, Mike Gillespie, risk, Security, security threat
  • Read More
16Dec

TalkTalk advised not to talktalk about their breach?

According the International Business Times, the Metropolitan Police advised TalkTalk not to discuss their breach. (you can read the article here) Here, in conversation on the topic , is Advent IM Directors, Julia McCarron and Mike Gillespie and Security Consultant, Chris Cope. “This is interesting as it shows the 2 different priorities at work.  For […]
  • Posted by Ellie Hurst
  • On 16th December 2015
  • 0 Comments
  • cyber security, data breach, data protection act, Dido Harding, information security, Infosec, police, security breach, security cyber attack, TalkTalk
  • Read More
07Dec

Security Predictions for 2016

As 2015 draws to a close, we asked the Advent IM Staff to ponder the challenges for next year. 2015 saw some huge data and security fumbles and millions of people had their personal information exposed as hack after hack revealed not only how much this activity is on the increase, but also how  the […]
  • Posted by Ellie Hurst
  • On 7th December 2015
  • 0 Comments
  • advent IM, Chris Cope, cyber security, Dale Penn, data protection, data protection act, Del Brazil, Ellie Hurst, hacking, information security, ISO27001, Julia McCarron, Mark Jones, Mike Gillespie, Security, security 2016, security predictions, security threat, training
  • Read More
02Dec

‘Tis the season to be jolly… careful.

Thanks to Chris Cope for this look at Festive scams. Its that time of year when we all spend plenty of money buying presents for loved ones and, in a trend that increases year on year, many of these transactions are carried out online.  Online transactions are worth millions of pounds to retailers and its […]
  • Posted by Ellie Hurst
  • On 2nd December 2015
  • 0 Comments
  • christmas shopping, malware, online shopping, scams, Security, spoofing
  • Read More
02Dec

Why would anyone want to hack the weather?

A review of the news of the BoM attack  from Security Consultant, Chris Cope. Or more precisely, why would anyone want to hack the Australian met office?  Well, its happened and officials are quick to announce that the damage will take millions of dollars to fix and that China was responsible for the hack.  Its […]
  • Posted by Ellie Hurst
  • On 2nd December 2015
  • 0 Comments
  • Australia, BoM, cyber attack, cyber security, Government, hacking, Security, security threat
  • Read More
30Nov

The Advent, Advent Calendar…

It has become a tradition for us to share a security tip or jolly every day of Advent and this year is no different.  Here it is, all ready for the start of Advent, tomorrow…
  • Posted by Ellie Hurst
  • On 30th November 2015
  • 0 Comments
  • advent calendar, security tips
  • Read More
30Nov

Cyber Monday top tips

Cyber Monday is upon us again.. or should I say #cybermonday. Anyway, I asked our Security Consultants to come up with some top tips to help you shop a bit more securely for your Christmas gifts and decorations. Thanks to Chris Cope and Del Brazil for this.  (other online vendors are available)   Always check for […]
  • Posted by Ellie Hurst
  • On 30th November 2015
  • 0 Comments
  • christmas shopping, cyber monday, cyber security, online shopping, Security
  • Read More
26Nov

Trident vulnerable to hacking?

By Julia McCarron with contribution from Chris Cope. There have been a number of press stories in the last few days that could have us searching for our 3 pronged spears to protect these shores because, if the news is to be believed, the missile version of Trident could be rendered useless or obsolete from […]
  • Posted by Ellie Hurst
  • On 26th November 2015
  • 0 Comments
  • cyber attack, cyber security, hacking, ISO27001, missiles, MOD, nuclear, Trident
  • Read More
25Nov

Email Insecurity

This time of year, there is an upsurge in phishing and other malicious emails for us to contend with. From phony delivery notices to hoax PayPal problem emails, our inboxes are awash with attempts to invade, defraud and otherwise cause us chaos or loss. So the news that people are not taking the threat from email seriously after […]
  • Posted by Ellie Hurst
  • On 25th November 2015
  • 0 Comments
  • BYOD, cyber fraud, cyber security, email, fraud, information security, phishing, Security, spam
  • Read More
06Nov

Morrisons staff suing over data breach. Del Brazil takes a look at what we know and what it might mean.

Advent IM Security Consultant, Del Brazil discusses some of the questions raised by the legal action from Morrisons employees over a data breach that led to their private information being leaked… It has been reported in Computer Weekly that thousands of Morrisons staff are planning to sue the retailer over a data breach in which a disgruntled former […]
  • Posted by Ellie Hurst
  • On 6th November 2015
  • 0 Comments
  • data breach, data protection act, employee rights, employment law, information security, Insider threat, litigation, Morrisons, Security
  • Read More
05Nov

“Five Eyes” intelligence document leak – Australian Defence bureaucrat off to jail

This week saw the news that the junior bureaucrat from the Australian Department of Defence, has been jailed for one year, following his guilty plea in the ACT Supreme Court to posting a secret Defence Intelligence Organisation, to an online forum. Julia McCarron gives her take on this quite staggering series of events. Not a ‘Gooday’ […]
  • Posted by Ellie Hurst
  • On 5th November 2015
  • 0 Comments
  • advent IM, Australia, cyber security, Department of Defence, five eyes, information security, Insider threat, intelligence, Julia McCarron, national security, Security, security policy, spooks, vetting
  • Read More
03Nov

SAFE HARBOUR RETURNS…

From Dale Penn, Advent IM Security Consultant Safe Harbour was a process by which US companies could comply with the  EU Directive 95/46/EC on the protection of personal data when transferring data “across the pond” Intended for organizations within the European Union or United States which store customer data, the Safe Harbour Principles are designed […]
  • Posted by Ellie Hurst
  • On 3rd November 2015
  • 0 Comments
  • business, data protection, EU directive, Infosec, safe harbor, safe harbour, Security
  • Read More
30Oct

Banking on Good Cyber Security

Julia McCarron reflects on the news that regulators are almost at the point of requiring major financial services companies to participate in a cyber security testing programme, according to the Bank of England. It was nice to see the Bank of England talking about cyber security recently, and the importance it sees in testing awareness and resilience […]
  • Posted by Ellie Hurst
  • On 30th October 2015
  • 0 Comments
  • Bank of England, business, cyber security, cyber testing, financial services, phishing, resilience
  • Read More
29Oct

Have you got the energy for another breach…?

Julia McCarron, Advent IM Director, looks at the British Gas breach that saw customer details published online and the energy giant claiming they had not been breached and the details must have come from elsewhere… So let’s get this straight. The email addresses and passwords definitely belonged to British Gas customers? Tick. They definitely accessed British […]
  • Posted by Ellie Hurst
  • On 29th October 2015
  • 0 Comments
  • British Gas, cyber security, data breach, Infosec, online accounts, passwords
  • Read More
29Oct

This isn’t just poor security….a post on the M&S security incident from Julia McCarron

Advent IM Director, Julia McCarron has turned her eye to the M&S security breach… Well as our Marcomms Manager, Ellie superbly put it, “This isn’t just poor security, this is M&S poor security”. The brand synonymous with quality has let the side down following what it claims was an internal system glitch that caused M&S online account […]
  • Posted by Ellie Hurst
  • On 29th October 2015
  • 0 Comments
  • advent IM, customer information, cyber security, data breach, data leak, information security, Julia McCarron, marks and spencers, Security, website
  • Read More
28Oct

Nuclear Power Plant Worker caught looking at bomb-making websites….

A nuclear power plant worker in Scotland has been escorted from  EDF’s West Kilbride premises and the police called, after allegedly viewing bomb-making websites whilst at work.  The full story is here. Some comment from Advent IM DIrector, Julia McCarron. Trying to find out how to build a bomb whilst working on-site at a nuclear […]
  • Posted by Ellie Hurst
  • On 28th October 2015
  • 0 Comments
  • bomb making, CNI, Critical National Infrastructure, EDF, employee monitoring, nuclear, security culture, security vetting
  • Read More
26Oct

Aviva 2nd Data Breach

Advent IM Security Consultant Del Brazil, gives us his thoughts on the Aviva data breach. For the second time in less than two years Aviva have reported a data breach in which customer data has been released to person(s) unknown.  It is unclear at this time as to whether it a procedural issue, a technical misconfiguration […]
  • Posted by Ellie Hurst
  • On 26th October 2015
  • 0 Comments
  • aviva, cyber security, cybercrime, data breach, data protection, staff vetting
  • Read More
23Oct

CRIME OF OUR GENERATION – A Look at the TalkTalk Breach

A review from Advent IM Security Consultant, Chris Cope. The TalkTalk hack has left another major UK business reeling from a cyber attack and customers angry as, once again, there is a possibility that sensitive information is now in the public domain.  The telecommunications company decided to take its own website offline on Wednesday following […]
  • Posted by Ellie Hurst
  • On 23rd October 2015
  • 0 Comments
  • cyberattack, cybercrime, data breach, hack, Metropolitan police, TalkTalk, unencrypted
  • Read More
21Oct

Get Safe Online Week – Our Contribution

We are halfway through Get Safe Online Week and although we are generally business-focused, we felt it was very important to get involved and to issue some advice that everyone can use. So we have some Personal User and some Business User advice below for you, Courtesy of Del Brazil, Advent IM Security Consultant. #GetSafeOnlineWeek Here in […]
  • Posted by Ellie Hurst
  • On 21st October 2015
  • 0 Comments
  • Read More
16Oct

The Insider that rarely gets questioned…

Insider Threat certainly isn’t going away, is it? Reading the continual survey results and news items I see published, it will still be an issue for a long time to come. We know that a lot of the Risk that Insiders bring can be mitigated with good policy and process combined with tech that is fit for purpose. But […]
  • Posted by Ellie Hurst
  • On 16th October 2015
  • 0 Comments
  • boardroom, BYOD, c suite, cybersecurity, data protection, Insider threat, risk, risky behaviour, Security in the boardroom, security policy
  • Read More
09Oct

No more Safe Harbour…or Harbor

European Court of Justice has ruled that transatlantic data sharing agreement is invalid. What does this mean for UK businesses that utilise US datacentres or Cloud services? Advent IM Director Mike Gillespie, “There are issues arising from this ruling that require the urgent attention of UK businesses and they need to be aware of the […]
  • Posted by Ellie Hurst
  • On 9th October 2015
  • 0 Comments
  • business, data protection, EU, information security, legislation, privacy, safe harbour, Security, surveillance, US
  • Read More
08Oct

Attack of the Drones – guest post from Julia McCarron – Advent IM Director

So this week came the worrying news that mobile phones attached to drones can hack Wi-Fi devices and steal our data. That Star Wars script of yesteryear could be coming into its own! Oh hang on … that was Clones not Drones J But seriously, the use of drones in warfare is becoming more and […]
  • Posted by Ellie Hurst
  • On 8th October 2015
  • 0 Comments
  • 1984, drones, hacking, Security, Star Wars, surveillance, UAVs
  • Read More
03Sep

What is TOR ?

An opinion piece post from Advent IM Consultant, Del Brazil TOR is a service that is freely downloadable that assists in providing anonymity or improves privacy for users who wish to keep, among other things, their internet location secure.  In essence it provides a defensive mechanism against traffic analysis, network surveillance and assists in protecting […]
  • Posted by Ellie Hurst
  • On 3rd September 2015
  • 0 Comments
  • anonymous browsing, cyber security, dark web, deep net, privacy, Security, Tor
  • Read More
05Aug

Security Specialists Security Breached – from Dale Penn

From Dale Penn, Advent IM Security Consultant.. The recent hacks of Bit defender and Hacking Team just go to show that if you don’t address the basics you are going to leave yourself vulnerable to attack. So what did they do wrong that we can learn from and reduce the risk to our organisations? Both […]
  • Posted by Ellie Hurst
  • On 5th August 2015
  • 0 Comments
  • Read More
14Jul

Planes, Trains and Automobiles (and news stories about hacking them)

A guest post from Dale Penn, an Advent IM Security Consultant – taking a look at vehicle hacking and questioning how much we really need to fear. Even though the title is a tribute to a classic, well-loved comedy, the subject I am about to discuss is no joke! All of us have seen recent […]
  • Posted by Ellie Hurst
  • On 14th July 2015
  • 0 Comments
  • advent IM, car hacking, plane hacking, train hacking, transport security, vehicle hacking
  • Read More
29Jun

Social Engineering – Still the best attacker exploit – guest post from Dale Penn, Advent IM Security Consultant

Another great post from one of our consultants, this time from Dale Penn on the topic of Social Engineering. Introduction Social engineering is still the most prolific and successful method of hacking. It is a non-technical attack that relies on a user being tricked or coerced into some form of action which presents the attacker […]
  • Posted by Ellie Hurst
  • On 29th June 2015
  • 0 Comments
  • phishing, pretexting, Security, social engineering, training, vishing
  • Read More
25Jun

New Whitepapers added to the Website…

Go to the Advent IM Website for FREE downloads of these and other Whitepapers from Advent IM specialists   Security in Independent Education Sector – this whitepaper discusses some of the challenges and threats that Independent Education facilities need to consider along with some advice and guidance Security for SMEs – this whitepaper looks at […]
  • Posted by Ellie Hurst
  • On 25th June 2015
  • 0 Comments
  • advent IM, education, Security, SMEs, whitepaper
  • Read More
23Jun

EU Data Protection Changes – What You Need To Know

Thank you to Dale Penn, one of the talented Advent IM Security Consultants for this informative guest post. GDPR (General Data Protection Regulation) Introduction This January the European Commission revealed a draft of its GDPR. The European Commission is hoping to introduce the GDPR by this end of 2015 to replace the outdated EU Data […]
  • Posted by Ellie Hurst
  • On 23rd June 2015
  • 0 Comments
  • advent IM, cyber security, data protection, EU, EU Regulation, GDPR, information security, ISO27001
  • Read More
22Jun

Are you still operating XP or Windows 2003? – A guest post from Julia McCarron, Advent IM Director

Whilst Microsoft’s utopia may be for us all to automatically upgrade every time there is a new version of Windows, for many organisations this isn’t always an option. With some still coping with life after the recession the cost of upgrading to new platforms can be restrictive, especially if XP and Windows 2003 still works […]
  • Posted by Ellie Hurst
  • On 22nd June 2015
  • 0 Comments
  • advent IM, cyber security, IT, IT security, Julia McCarron, microsoft, risk, risk assessment, Security, security advice, security patching, security support, servers, windows, windows 2003, XP
  • Read More
09Jun

Most Influential in Security 2015…

..at Number 8 is Mike Gillespie, Advent IM MD. Well done Mike!  Full list is here
  • Posted by Ellie Hurst
  • On 9th June 2015
  • 0 Comments
  • advent IM, IFSEC, Mike Gillespie, top 50 most influential in security
  • Read More
08Jun

Attack Trees

Following on from his last popular post, Advent IM Consultant, Del Brazil turns his attention to Attack Trees. Recently the SPF Mandatory Requirement to use the HMG IS 1&2 Technical Risk Assessment methodology was withdrawn and has resulted in organisations being afforded the luxury of identifying and using a more appropriate and manageable risk assessment […]
  • Posted by Ellie Hurst
  • On 8th June 2015
  • 0 Comments
  • attack trees, cyber security, HMG, Infosec, RMADS, Security Policy Framework, SPF, Technical information Risk Management, Technical Risk Assessment
  • Read More
05Jun

We are recruiting! Sales Executive role….

If you are motivated sales individual, pop over to the Advent IM website and have a look at our vacancy details. http://www.advent-im.co.uk/sales_executive.aspx
  • Posted by Ellie Hurst
  • On 5th June 2015
  • 0 Comments
  • advent IM, IT security sales, recruitment, sales vacancy, security vacancy
  • Read More
01Jun

Most Influential in Security 2015 -IFSEC

You may want to vote for someone on the IFSEC list from last year – like Mike Gillespie who was 8th, or you may have someone else in mind. Either way, you have till June 8th (9am) to get your vote in. Good luck to everyone nominated and long may you continue to be a […]
  • Posted by Ellie Hurst
  • On 1st June 2015
  • 0 Comments
  • advent IM, cyber security, IFSEC, most influential in security 2015, physical security, Security, vote
  • Read More
29May

Infosec and IFSEC 2015…how to find us

It’s that time of year again! If you are hoping to meet up with us at either of these two important events, you can find Gareth Williams on stand S70 near the BIS Innovation Zone on Day 1 (2nd June) of Infosecurity2015. You can email us at bestpractice@advent-im.co.uk or tweet us @Advent_IM to arrange to […]
  • Posted by Ellie Hurst
  • On 29th May 2015
  • 0 Comments
  • advent IM, cyber security, IFSEC, Infosec, Mike Gillespie
  • Read More
27May

Ransomware – the background and what you need to know

A blog post from one of our Security Consultants, Del Brazil. Ransomware first appeared in the early part of latter 20th Century, with the first reported version being the AIDS Trojan Horse which was created and released in the USA.  Since then the development has rapidly increased, resulting in over 250,000 variants of Ransomware identified […]
  • Posted by Ellie Hurst
  • On 27th May 2015
  • 0 Comments
  • cyber security, malware, ransomeware, Security
  • Read More
25Feb

Local MP, James Morris, supports efforts to bridge the cyber skills gap.

**Press Release** Midland based Cyber/Information Security Consultancy and members of the Malvern Cyber Security Cluster, Advent IM enjoyed some serious discussion of how to bridge the cyber security skills gap with James Morris, the MP for Halesowen and Rowley Regis MP.   Advent IM, the UKs leading independent holistic security consultancy welcomed local MP James […]
  • Posted by Ellie Hurst
  • On 25th February 2015
  • 0 Comments
  • advent IM, apprenticeships, cyber security, cyber skills gap, Halesowen, James Morris MP, malvern cyber security cluster, Rowley Regis, security skills gap, skills gap, training
  • Read More
24Feb

Security & Policing Home Office Event – come and see us!

We will be exhibiting at the Security & Policing Home Office Event 10th-12th March 2015 at FIVE, Farnborough You can find us in the Cyber Zone on stand 0-14 Look out for Mike Gillespie and Paul Oughton who should be around the stand for part of the event.    You can tweet us there @Advent_IM […]
  • Posted by Ellie Hurst
  • On 24th February 2015
  • 0 Comments
  • advent IM, Cyber Zone, Home Office event, Mike Gillespie, Security & Policing 2015, security expo
  • Read More
12Feb

How cyber-attacks affect local and national businesses – The Rt. Hon. James Morris MP visits Midland based experts to find out.

Midland based Cyber/Information Security Consultancy and members of the Malvern Cyber Security Cluster, Advent IM announce a forthcoming visit from Halesowen and Rowley Regis MP, James Morris. The visit is planned for the Advent IM Offices and Training Centre on February 20th at 11.30am. 5 Coombs Wood Court, Steel Park Road, Halesowen B62 8BF. This […]
  • Posted by Ellie Hurst
  • On 12th February 2015
  • 0 Comments
  • advent IM, cyber attack, cyber security, cyber security consultancy, cyber training, hacking, James Morris MP, malvern cyber security cluster, Mike Gillespie, MP visit, press release, security awareness training
  • Read More
22Jan

Francis Maude visits Midlands Cyber Security Firm

The Rt. Hon. Francis Maude MP called in to meet the team at a West Midlands based Cyber Security Consultancy today. Today, Advent IM was pleased to host a visit by the Rt. Hon Francis Maude MP as part of his remit as the Minister for Cyber Security.  Mr. Maude met with co-founders of Advent […]
  • Posted by Ellie Hurst
  • On 22nd January 2015
  • 0 Comments
  • advent IM, Cabinet Office, cyber security, francis maude, HM Government, Julia McCarron, malvern cyber security cluster, Mike Gillespie, security consultancy
  • Read More
13Jan

Cyber Security Solution suppliers to HM Government..

**PRESS RELEASE** Advent IM Recognised as Cyber Security Solution Supplier to HM Government Media Contact: Ellie Hurst  +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date :13.01.15 Holistic Security Consultancy and member of the Malvern Cyber Security Cluster, Advent IM Ltd, have today announced their confirmed status as Cyber Security Solution suppliers to HM Government. Advent IM today […]
  • Posted by Ellie Hurst
  • On 13th January 2015
  • 0 Comments
  • advent IM, cyber, government supplier, HM Government, HMG, malvern cyber security cluster, Security, security consultants, UK Government
  • Read More
06Jan

Watch out for those iPhone/iPad phishing emails

For reasons far too dull to expand upon, there were no Apple products in my stocking this year. I have however, had a mountain of email telling me to click through various links in order to re-register my iPad, to download a free app or piece of music, and a variety of other things. Also for […]
  • Posted by Ellie Hurst
  • On 6th January 2015
  • 0 Comments
  • advent IM, apple, cybercrime, email, ipad, iphone, malware, phishing, privacy, Security
  • Read More
11Dec

Does Santa Have ISO28000?

During a festive office pondering, the topic of ISO28000 popped up. That might seem random to most people but this is Advent IM and you simply never know when a security standard might become pertinent. In this instance we were discussing Santa; it being the season to be jolly etc. Here is a logistics expert […]
  • Posted by Ellie Hurst
  • On 11th December 2014
  • 0 Comments
  • ISO28000, logistics, Santa, supplier assurance, supply chain assurance, supply chain resilience, supply chain security, transport assurance, transport security
  • Read More
06Nov

Shellshock – what you need to know.

A post from Advent IM Consultant, Dale Penn Shellshock what you need to know! INTRODUCTION First of all what is the Shellshock software bug? Shellshock (sometimes known as Bashdoor) is a group of security vulnerabilities which were found in the Unix Bash Shell. That can be pretty confusing for the average user so here is […]
  • Posted by Ellie Hurst
  • On 6th November 2014
  • 0 Comments
  • apple, BASH, Linux, Shellshock, Unix
  • Read More
05Nov

ISO27001:2013 Transition Training now available!

**PRESS RELEASE**                                                                 Media Contact: Ellie Hurst  +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date :05 Nov 2014 ISO27001 Transition Training now available Information Security experts, Advent IM, today announced the launch of ISO27001:2013 transition training course. Last year, the de facto Information Security standard ISO/IEC27001 underwent changes and some important alterations have been made to various controls […]
  • Posted by Ellie Hurst
  • On 5th November 2014
  • 0 Comments
  • advent IM, ISO/IEC 27001:2013, ISO/IEC27001, ISO27001, ISO27001 transition Training, training
  • Read More
05Nov

Some places left on our HMG Accreditation Concepts Course in December

As usual, these will be allocated on a first come-first served basis. Designed to help delegates understand the HMG accreditation process and how to identify, assess and treat risks appropriately following the guidance in IAS Stds 1&2, associated supplement and GPG47. This course is only open to public sector employees. Please contact us for further […]
  • Posted by Ellie Hurst
  • On 5th November 2014
  • 0 Comments
  • Accreditation Concepts training, accreditor, advent IM, HMG, IAS 1 & 2, training
  • Read More
30Sep

October 1st – Government Suppliers will be required to have Cyber Essentials

From 1 October 2014, Government will require all suppliers bidding for certain contracts which are assessed as higher risk to be Cyber Essentials certified. The suppliers and contracts affected are likely to be from the following sectors: IT managed or outsourced services, commercial services, financial services, legal services, HR services and business services. This will […]
  • Posted by Ellie Hurst
  • On 30th September 2014
  • 0 Comments
  • advent IM, cyber consulting, Cyber Essentials, cyber security, ISO27001, UK Government
  • Read More
26Sep

Successful Cyber Essentials and IASME Certifications for Advent IM!

Successful Cyber Essentials and IASME Certifications for Advent IM The independent holistic security specialists gain successful certifications to both schemes Advent IM Ltd, the UKs leading independent holistic security consultants today announced their successful certification to both Cyber Essentials, the UK Government’s cyber security assurance scheme and IASME  Information Assurance standard for SME’s. Operations Director, Julia […]
  • Posted by Ellie Hurst
  • On 26th September 2014
  • 0 Comments
  • advent IM, Cyber Essentials, cyber security, IASME, information security, Infosec
  • Read More
26Sep

Targeting of “Western” Critical National Infrastructure and how we all play a part in its defence.

I have read several opinion pieces that suggest ISIS is planning a cyber-geddon style attack on “the West’s” Critical National Infrastructure (CNI). Given the current nature of warfare and the growth of cyberwar/terrorism this seems like a logical opinion. From the inaugural FT Cyber Security Summit in June this year: Countries are having to defend […]
  • Posted by Ellie Hurst
  • On 26th September 2014
  • 0 Comments
  • advent IM, CNI, Critical National Infrastructure, cyber attack, cyber security, cyber terrorism, information security, ISIS, security threat, supply chain, threat convergence
  • Read More
18Sep

The U2 Album and some phishing

Opinions vary on the success and indeed the ethics of Apple’s decision to place a copy of U2’s new music in iTunes libraries. Some people have welcomed it, though I assume these are the ones who did not have their personal preferences overridden. Apparently, it appears many people had not selected the auto download option in their settings […]
  • Posted by Ellie Hurst
  • On 18th September 2014
  • 0 Comments
  • #Iblamebono, apple, Bono, iTunes, malware, phishing, phishing email, privacy, privacy breach, Security, Songs of Innocence, spyware, U2, U2 removal tool
  • Read More
29Aug

Up-coming speaker slots – Mike Gillespie

Our MD and Director of Cyber Security Strategy & Research for the Security Institute, will be speaking at a couple of events in the near future. Total Security Summit 20-21st October  Details via the link http://www.forumevents.co.uk/forum/total-security-summit/total-security-summit-october.html Mike will be talking about “Cyberspeak, Crime & Prosecution” _________________________________________________________________ ST14 Autumn 28th October (networking dinner on previous night if […]
  • Posted by Ellie Hurst
  • On 29th August 2014
  • 0 Comments
  • Professional Security Magazine, ST14, Total Security Summit, TSS
  • Read More
29Aug

Women in Security Awards – Thanks for the nominations

…and good luck to all nominees. If anyone has yet to nominate you have the rest of the day!  http://www.professionalsecurity.co.uk/wis/ Thanks to Professional Security Magazine – the website also contains details of how to get tickets for the event etc.  
  • Posted by Ellie Hurst
  • On 29th August 2014
  • 0 Comments
  • Professional Security Magazine, WIS, Women in Security Awards
  • Read More
14Aug

We Are Recruiting!

We are currently looking for a Business Development Consultant for Cyber Security. You can find details on our website along with details of how to apply. http://www.advent-im.co.uk/business_development_consultant.aspx
  • Posted by Ellie Hurst
  • On 14th August 2014
  • 0 Comments
  • advent IM, business development consultant, cyber security, recruitment, sales, vacancy
  • Read More
14Aug

Public Sector SIRO training places for October 8th

There are a couple of spaces left on October’s Public Sector Senior Information Risk Owner (SIRO) training course. In summary: Having successfully developed and delivered SIRO Training for the UK’s Police Forces since 2012, we have redesigned our popular and well respected SIRO training course for the broader public sector.  Our training course will give […]
  • Posted by Ellie Hurst
  • On 14th August 2014
  • 0 Comments
  • data protection, information security, ISO27001, public sector, Senior information risk owner, SIRO, SIRO accountabilies, SIRO role and responsbilities, training
  • Read More
18Jul

DDoS attacks cause an average jump of 36% in customer complaints

According to research commissioned by BT through Vanson Bourne, on average customer complaints to businesses increase by 36% in the aftermath of a Distributed Denial of Service (DDoS) attack. It seems like a staggering uplift but when you consider that in the UK alone the same research revealed that almost 60% of businesses admitted DDoS […]
  • Posted by Ellie Hurst
  • On 18th July 2014
  • 0 Comments
  • advent IM, BT, business, cyber attack, cyber security, DDoS, risk, threat, Vanson Bourne
  • Read More
16Jul

Mike presenting at ST14 Autumn

ST14 program has been unveiled and Mike will be joining the great and the good in security, on the rostrum. Mike will be presenting on Threat Convergence. Watch this space for more details or visit the official site so you can sign up for this free event.     
  • Posted by Ellie Hurst
  • On 16th July 2014
  • 0 Comments
  • advent IM, cyber security, event, Mike Gillespie, security event, ST14, ST14 Autumn, threat convergence
  • Read More
19Jun

IFSEC top 40 most influential in Security – Mike is at Number 8!

http://www.ifsecglobal.com/top-40-influential-people-security-results-just-ifsec-international-2014/#comments Well done to our MD, Mike Gillespie for making into the Top 10 of the Most Influential in Security 2014. This has been a great week at IFSEC for Mike. His presentation on UK Cyber Security Posture was very well received and we will be voicing over a version for the website and youtube […]
  • Posted by Ellie Hurst
  • On 19th June 2014
  • 0 Comments
  • advent IM, cyber security, IFSEC 2014, IFSEC TOp 40 Most influential in Security, information security, Mike Gillespie, security threat
  • Read More
04Jun

Public Sector Senior Information Risk Owner Training

There are a couple of places left on the 9th July intake. Details here  Hurry, its first come first served. You can book the October course from the same link. NB. This is Public Sector only. If you are from the private sector and are looking for Information Security training, please contact us on 0121 […]
  • Posted by Ellie Hurst
  • On 4th June 2014
  • 0 Comments
  • information security, Infosec, public sector, Senior information risk owner, SIRO, training
  • Read More
03Jun

Cryptolocker – What you can do right now.

The National Crime Agency (NCA) yesterday issued a warning about Cryptolocker  This is a malicious program called ransomware. Most ransomware will effectively lock your computer up then demand payment to unlock it. Cryptolocker is a bit different as it basically encrypts everything on your system: images, document files, databases,  but the encryption key is not stored […]
  • Posted by Ellie Hurst
  • On 3rd June 2014
  • 0 Comments
  • actionfraud, advent IM, cryptolocker, cryptolocker advice, cyber crime, extortion, GoZeus, hacking, malware, NCA, P2PZeus, scam
  • Read More
22May

Ebay User Data Breach

Our MD, Mike Gillespie was speaking on BBC Radio 5 Live and BBC Radio Scotland about this disastrous data breach. There will be audio files soon for those who want to hear his comment and advice. Watch this space. Phishing One of the facts that has emerged so far is that this hack was in […]
  • Posted by Ellie Hurst
  • On 22nd May 2014
  • 0 Comments
  • advent IM, BBC, cyber criminals, cyber security, cyberspace, Ebay Breach, Ebay hack, Mike Gillespie, phishing, Security, spear phishing, stolen credentials, vishing
  • Read More
15May

Vote in the IFSEC Most Influential in Security 2014

Our very own Mike Gillespie has been nominated and you can use the vote/nomination form to vote whomever you choose here http://www.ifsecglobal.com/vote-security-40-fire-20/  If you would like to see the reach Mike has had in the last 12 months,have a look at here at sample of some of the knowledge and opinion sharing output. http://www.advent-im.co.uk/advent_im_news.aspx  Mike was very pleased […]
  • Posted by Ellie Hurst
  • On 15th May 2014
  • 0 Comments
  • Read More
12May

UK at the forefront of the fight against cybercrime

The UK is uniquely placed to spearhead the global response to cybercrime, according to Andy Archibald, Head of the National Crime Agency’s (NCA) National Cyber Crime Unit (NCCU). But does the UK have it’s cyber-ducks inline? There are many areas to consider as we push forward to promote a global response to cyberthreat. The UK […]
  • Posted by Ellie Hurst
  • On 12th May 2014
  • 0 Comments
  • BT Cyber preparedness Survey, Cert UK, cyber security, cybercrime, EU cyber security, global cyber crime, information security, security posture, UK cyber security
  • Read More
07May

Cyber for Beginners and UK Cyber Security Posture…

It was great to connect with some of you at Infosec Europe and Counter Terror Expo. These events were more challenging than normal with the tube strike but as you would expect, everyone rallied round and made the best of it. In the end I think a good time was had by all. Of course, […]
  • Posted by Ellie Hurst
  • On 7th May 2014
  • 0 Comments
  • advent IM, counter terror, Cyber Master Class, cyber security for beginners, cyber terrorism, cybercrime, expo, IFSEC 2014, Mike Gillespie, security presentation, The Security Institute
  • Read More
22Apr

Infosec 2014 and Counter Terror Expo – come and see us

  Mike will be chairing a workshop at 10am at Counter Terror Expo on 29th April. Mike will also be on the Security Institute stand (B31) afterward. At InfoSec 2014 members of the team will be available on the Malvern Cyber Security Cluster stand (C85) and on the IISP stand (D50) so come along and […]
  • Posted by Ellie Hurst
  • On 22nd April 2014
  • 0 Comments
  • advent IM, counter terror expo, IISP, infosec 2014, malvern cyber security cluster, Mike Gillespie, The Security Institute
  • Read More
15Apr

Heartbleed – some info and some advice

If we can help then get in touch but here is some information for you.   
  • Posted by Ellie Hurst
  • On 15th April 2014
  • 0 Comments
  • advent IM, cyber security, cybercrime, hack, heartbleed, heartbleed advice, heartbleed hack, heartbleed phishing, information security, Infosec, online merchant, online security, password, password security, pci dss, Security, website hack
  • Read More
09Apr

Cyber Skill Shortage interview

If you missed the Cyber Skills Shortage piece on Radio 5 Live (and iplayer) recently then you might like this… needs sound, obviously. NB. Mike appears at about 11.37 but we strongly recommend you listen to the whole piece. It lasts roughly half an hour.
  • Posted by Ellie Hurst
  • On 9th April 2014
  • 0 Comments
  • advent IM, BBC, Cyber Security skills gap, cyber skills, ethical hacking, hacking, information security, malvern cyber security cluster, Mike Gillespie, penetration testing, Radio 5 Live, Stephanie Daman, UK Cyber Security Challenge
  • Read More
28Mar

Cyber Security on BBC Radio 5 Live (update)

Our MD, Mike Gillespie, whom some of you will have met at various Security events, is due to appear live on Radio 5 Live on Monday 31st March at 10am. (subject to the issues that live broadcast can throw up and that no one can control, of course!) The piece will be on Cyber Security and […]
  • Posted by Ellie Hurst
  • On 28th March 2014
  • 0 Comments
  • BBC Radio 5 Live, business, cyber security, cyber security challenge, Mike Gillespie, security skills gap
  • Read More
25Mar

Big Data …. Friend or Foe?

Delighted to have a post from Advent IM Operations Director, Julia McCarron. Ellie has been asking me for a while now to do a blog piece on ‘big’ data, and I must confess to dragging my heels because I wasn’t really sure what it was. I guess if I had put my mind to it […]
  • Posted by Ellie Hurst
  • On 25th March 2014
  • 0 Comments
  • advent IM, big data, cyber security, data breach, data processing, information security, internet of things, Julia McCarron, NHS care.data, secure data, security breach
  • Read More
06Mar

Our HMG Accreditation Concepts Course gets IISP Accreditation

HMG Accreditation Concepts Training Course is now an IISP Accredited Course The popular Advent IM HMG Accreditation Concepts course now comes with its own accreditation from The Institute of Information Security Professionals (IISP)  Having been run regularly for many years, this well-respected course is designed to help Public Sector delegates understand the HMG accreditation process […]
  • Posted by Ellie Hurst
  • On 6th March 2014
  • 0 Comments
  • HMG, IISP, information security, Infosec, training
  • Read More
25Feb

Phishing email claims to be from SRA…

Beware of all phishing. Spear phishing is more precise and aimed a little more this looks to be a more sophisticated standard phish.
  • Posted by Ellie Hurst
  • On 25th February 2014
  • 0 Comments
  • Read More
20Feb

Geography Lesson – a Cyber attack has no geography

This morning’s security news bought the usual slew of stories on new products, advice and data breaches. One data breach that caught my eye was Maryland University. For reasons that will become clear I will be watching this unfold. Maryland University has in the last few days suffered a massive data breach that has been characterised as a […]
  • Posted by Ellie Hurst
  • On 20th February 2014
  • 0 Comments
  • advent IM, cyber attack, data breach, hack, information security, university, university security
  • Read More
18Feb

Why every day is Data Protection Day

Excerpt from Outsource Magazine article. Hopefully it won’t have escaped your attention that the 28th of January marked EU Data Protection Day, also known as Data Privacy Day. This awareness-raising event has moved out of the EU in real terms and activities relating to both protection and privacy happen globally. Link to the full article […]
  • Posted by Ellie Hurst
  • On 18th February 2014
  • 0 Comments
  • #DPD14, advent IM, business, data protection, information security, outsource magazine, outsource security, Security, SME, supply chain
  • Read More
17Feb

Sunday Times – Mike Gillespie on SME Cyber Security

Excerpt from The Sunday Times dated 16th February 2014 Small firms can be targeted for their clients’ data as well, said Mike Gillespie, director of cyber research at the Security Institute, the industry body. “Look at the number of small businesses that are suppliers or subcontractors to government and big business,” he said.   Read […]
  • Posted by Ellie Hurst
  • On 17th February 2014
  • 0 Comments
  • advent IM, cyber, data protection, hack, information security, malware, security breach, security threat, SQL, The Sunday Times, virus
  • Read More
13Feb

Appy Valentine’s Day? Or the Valentine’s Day Mobile Massacre?

It’s that time of year when thoughts turn to love,romance and cupid firing his arrows at unsuspecting victims. (That may have come out wrong) It is also the time of year when the volume of threats to the security of computers and mobile devices rapidly increases, as we are offered new and exciting e-methods of […]
  • Posted by Ellie Hurst
  • On 13th February 2014
  • 0 Comments
  • app, app permissions, malware, mobile device, mobile phone, rogue app, romance, scam, valentine
  • Read More
28Jan

Data Protection and Off Shoring Data

Some thoughts on EU Data Protection Day from Advent IM and Security Institute Director, Mike Gillespie. Today (Jan 28th) Is EU Data Protection Day #DPD2014 and it has sparked some interesting content and discussion on Social Media so far. It has also afforded those organisations who bang the drum for Data Protection and Privacy to […]
  • Posted by Ellie Hurst
  • On 28th January 2014
  • 0 Comments
  • #DPD14, #DPD2014, advent IM, cloud, cloud computing, data processing, data protection act, data protection day, data subject, EEA, EU data protection, hosting, Mike Gillespie, safe harbor
  • Read More
14Jan

SMEs and Security or How SMEs can impact UK PLC Security (image)

  • Posted by Ellie Hurst
  • On 14th January 2014
  • 0 Comments
  • advent IM, data breach, data loss, data protection, data protection act, data sanitisation, data security, Department for Business, hacking, holistic, information security, innovation and skills, Insider threat, physical security, security threat, SME, SME security, UK PLC
  • Read More
13Dec

2013 over the shoulder

Time for a bit of a look back…sort of The rise and rise of BYOD, the discovery that Ebay is not the appropriate place to divest yourself of NHS Patient data and the increase in malware and not just any malware – mobile malware. These were a few of my (least) favourite things of 2013. […]
  • Posted by Ellie Hurst
  • On 13th December 2013
  • 0 Comments
  • advent IM, Building Management, cyber security, cyber threat, data breach, data loss, data protection, data protection act, data sanitisation, data security, information security, Insider threat, security breach, social engineering
  • Read More
26Nov

Board Room Behaviour – Sensitive Board Data (visual)

  • Posted by Ellie Hurst
  • On 26th November 2013
  • 0 Comments
  • advent IM, boardroom, c suite, compliance, confidential data, data breach, data security, information security, Insider threat, safe data storage, Security in the boardroom, security threat, sensitive data
  • Read More
22Nov

Data Protection and Temporary Workers – the Perfect Data Breach Storm?

This morning bought Security News stories from around the globe as usual. One jumped out at me, not because it was unusual but because the wording highlighted to me some dangerous assumptions and errors in thinking that we are guilty of. The story was about a temporary worker at a hospital who had sent letters […]
  • Posted by Ellie Hurst
  • On 22nd November 2013
  • 0 Comments
  • advent IM, data breach, data loss, data protection, data protection act, data security, information security, Insider threat, NHS, security breach, security threat, sensitive data, temporary workers
  • Read More
01Nov

The Advent IM boys do Movember!

As Autumn gets underway, Movember bristles its hairy way into our hearts once more and the lighthearted (and big hearted) side of our boys comes to the fore.  Please applaud and support their fund raising efforts and have a look at the Movember page here  More pics will follow…
  • Posted by Ellie Hurst
  • On 1st November 2013
  • 0 Comments
  • advent IM, fundraising, movember
  • Read More
18Oct

Steep Rise in Data Theft Cases through High Court (visual)

  • Posted by Ellie Hurst
  • On 18th October 2013
  • 0 Comments
  • advent IM, confidential data theft prosecutions, court cases data theft, data breach, data loss, data protection, data protection act, data security, data theft high court, information security, Insider threat, Security, security breach, security threat
  • Read More
17Oct

PCI-DSS PA-DSS (v3.0) Expected Change Highlights (v1.0) Tool

As mentioned in previous blog post, the payment card processing standard has some changes coming up. The standard should be issued in full next month, in the meantime and as promised, we are offering  a free guide to the anticipated changes to allow you to get ahead of the curve. You can get it free […]
  • Posted by Ellie Hurst
  • On 17th October 2013
  • 0 Comments
  • advent IM, card processing, information security, PA-DSS, pci dss, physical security, secure data, secure payment processing, Security
  • Read More
16Oct

Advent IM: ISO/IEC 27001:2013 Version 3.0 of the mapping tool released today

We have today released version 3.0 of the popular and helpful ISO/IEC 27001:2013 mapping tool. This compares and maps controls, clauses and other areas from the 2005 version against the new 2013 version and vice versa. The new version of the tool sees some additional information around documents and records. It is available FREE from […]
  • Posted by Ellie Hurst
  • On 16th October 2013
  • 0 Comments
  • advent IM, data breach, data loss, data protection, information security, Integrated Security, ISO/IEC 27001:2013, ISO/IEC27001, ISO27001, ISO27001 clauses, ISO27001 controls, mapping tool, risk assessment, secure data, security management
  • Read More
15Oct

PCI-DSS PA-DSS changes – latest updates

Anticipated changes to the standard for payment card security have been announced and PCI Security Standards Council have issued some guidelines ahead of the final changes to help merchants get ahead y reviewing and understanding the changes ahead of their implementation. The revised standard (Version 3.0) is due to come come out in November this […]
  • Posted by Ellie Hurst
  • On 15th October 2013
  • 0 Comments
  • mobile payment, PA-DSS, payment card security, pci dss, PCI DSS version 3.0
  • Read More
11Oct

Phishing, accountability and security awareness

Phishing – do employees recognise it when they see it? In the last week I have received around twenty phishing emails. These have varied from Linkedin connection requests, to Bank Account reset instructions and Paypal alerts that my security had been compromised…the irony of the last one did not escape me. In this period, I […]
  • Posted by Ellie Hurst
  • On 11th October 2013
  • 0 Comments
  • Advent, advent IM, data breach, data loss, hacking, information security, microsoft, safe data storage, scam, security breach, security threat, social engineering, windows
  • Read More
08Oct

We Are Recruiting Again!

We need another IA Practitioner Consultant to join our happy team. If you would like full details of the role and how to apply please come to our vacancy section on the website image courtesy of freedigitalphotos.net
  • Posted by Ellie Hurst
  • On 8th October 2013
  • 0 Comments
  • advent IM, IA Practitioner Consultant, information security, job, vacancy
  • Read More
03Oct

Additions and Further Key Findings added to ISO/IEC 27001:2013 Mapping Guidance Document

We have issued an augmented version of the mapping document. It has more key findings and a reverse mapping tool so it is now possible to compare clauses 2005 against 2013 and 2013 against 2005. It is still free to download and you can either take it from the latest news section of the website […]
  • Posted by Ellie Hurst
  • On 3rd October 2013
  • 0 Comments
  • advent IM, information security, ISO/IEC 27001:2013, ISO/IEC27001, ISO27001, Security
  • Read More
01Oct

ISO/IEC 27001 Guidance Document Now Available

We have now issued the first draft of the guidance document mapping 2005 against 2013. You can obtain a free copy from our website: http://www.advent-im.co.uk/advent_im_news.aspx or from our dedicated ISO27001 page http://www.advent-im.co.uk/iso_27001.aspx
  • Posted by Ellie Hurst
  • On 1st October 2013
  • 0 Comments
  • 2005 vs 2013, advent IM, information security, Information Security standard, Infosec, ISMS, ISO/IEC27001, ISO27001, risk assessment
  • Read More
30Sep

Changes to ISO/IEC 27001 Controls – Key Findings

The revised Information Security standard will be available tomorrow. We will be publishing our Control Mapping document to help understand the changes to the standard from the 2005 version. So check back here or go to our website www.advent-im.co.uk tomorrow… Until then our key findings on the changes based upon the most recent draft are below. […]
  • Posted by Ellie Hurst
  • On 30th September 2013
  • 0 Comments
  • IEC 27001, Information Security standard, ISMS, ISO, ISO27001, ISO27001 controls, ISO27001 new controls, standard mapping
  • Read More
27Sep

Insider Attack – getting harder to detect or prevent? (visual)

  • Posted by Ellie Hurst
  • On 27th September 2013
  • 0 Comments
  • advent IM, cyber attack prevention, cyber security, data security, employee security threat, information management, information security, insider attack, Insider threat, security attack, security breach, security threat, threat detection
  • Read More
26Sep

Hacking Pacemakers, Traffic Systems and Drones – Cyber and Physical Worlds Collide

The Telegraph today ran a piece on a subject close to our hearts here at Advent IM, namely the cyber threat to our physical world. You can read it here Regular readers will know we have expressed concern before that language can create barriers or false realities that can leave vulnerabilities and the prevalence of […]
  • Posted by Ellie Hurst
  • On 26th September 2013
  • 0 Comments
  • Advent, advent IM, Barnaby Jack, cctv, cyber, cyber security, cyber threat, cyber threat to the built estate, cyber threat to the physical world, data security, FM, hacking, hacking medical devices, holistic, information security, Security, security breach, security management, security threat, social engineering, The Telegraph
  • Read More
24Sep

SME Information Risk: 48% suffered reputational damage already from lost data

Originally published in Outsource Magazine August 2012 According to a recent survey by Iron Mountain and PricewaterhouseCoopers LLP (PWC), in Europe, mid-sized businesses are placing themselves at unnecessary Information Security risk.  The average index score for Information Risk maturity in this group was only 40.6 (a score out of 100), which sharply highlights the gap […]
  • Posted by Ellie Hurst
  • On 24th September 2013
  • 0 Comments
  • Advent, compliance, data protection, data security, disaster recovery, information security, Iron Mountain, ISO27001, outsource, outsource magazine, PWC, Security, security breach, security threat
  • Read More
24Sep

Technical Security Skill Shortfall Means Heightened Risk Levels For Business

First published in Outsource Magazine September 12 2013 A report commissioned by IBM concluded that Technical Information Security Skills are in short supply and that this is creating vulnerability and risk in business. The research, carried out by Forrester Research Inc., revealed that even mature organisations are facing increased risk exposure due to difficulty sourcing […]
  • Posted by Ellie Hurst
  • On 24th September 2013
  • 0 Comments
  • APT, BYOD, CISO, cloud computing, cyber attack, cyber security, forrester report, IBM survey, information security, ISO 27001, outsource magazine, outsourcing security, risk, risk appetite, risk assessment, risk management, risk mitigation, security threat, skills gap, supply chain resilience, technical security skills
  • Read More
16Sep

Size Really Doesn’t Matter in Cyberspace

Something we have all long since suspected, today confirmed by Allianz – the insurance giant. Size does not matter. At least not when it comes to being a target of a malicious cyber attack. According to Allianz, attackers are targeting large corporations by attacking their supply chains – smaller companies and SME’s that potentially offer […]
  • Posted by Ellie Hurst
  • On 16th September 2013
  • 0 Comments
  • Advent, advent IM, cyber, cyber threat, data breach, data security, disaster recovery, hack, hacker, information security, ISO27001, robust security, security breach, security threat, supply chain
  • Read More
29Aug

Breakfast Seminar Sept 26th 2013

  Please email breakfastbriefings@corpssecurity  to reserve a place. If you could copy us in ellie.hurst@advent-im.co.uk that would be really helpful.
  • Posted by Ellie Hurst
  • On 29th August 2013
  • 0 Comments
  • advent IM, beacon security, corps security, cyber, hacking, information security, Mike Gillespie, network security, Security, Security Institute Director, seminar
  • Read More
25Jun

Cyber Attack and Hack – Is Our Use of Language Creating Security Vulnerabilities in Our Thinking?

Hacking and Cyber attacks have hardly been off our media front pages for a long time. But are businesses and organisations misleading themselves by referring to these incidents as ‘hacks’ or as ‘cyber attacks’? Are businesses actually limiting their thinking and thereby creating vulnerabilities by mislabelling these important events? There is a strong indication this […]
  • Posted by Ellie Hurst
  • On 25th June 2013
  • 0 Comments
  • Advent, advent IM, cyber, cyber threat, data breach, data loss, data protection, data sanitisation, data security, hacking, holistic, information security, phishing, Security, security awareness training, security integration, security threat, social engineering, training
  • Read More
07Jun

Advent IM Join G-Cloud

Advent IM Ltd is pleased to announce its inclusion on the Government’s Cloud Store – G-Cloud. This is the newest Government Procurement Framework and gives the public sector access to highly discounted and exclusive Government framework pricing. This means confident procurement and avoids the need for expensive tendering, whilst offering reassurance that procurement rules and […]
  • Posted by Ellie Hurst
  • On 7th June 2013
  • 0 Comments
  • accreditation, Advent, advent IM, CESG, CLAS, Cloud top tips, compliance, cyber threat, G-Cloud, Government Procurement Service Supplier, hacking, HMG supplier, information security, procurement, risk assessment, security breach, security constultant, security management, security threat, training
  • Read More
04Jun

Upcoming Event – The Security Institute Annual Conference

We are delighted to announce that Mike Gillespie will be one of the guest speakers at this important and prestigious event. It will be held in London on June 19th and you can download the flyer with details of the event and how to book  here A5 Delegate Flyer. Mike will be talking about Insider Threat, […]
  • Posted by Ellie Hurst
  • On 4th June 2013
  • 0 Comments
  • advance persistent threat, Advent, advent IM, cyber security, cyber threat, Insider threat, Mike Gillespie, Security, social engineering, Speaking event, The Security Institute
  • Read More
15Apr

European Security Blogger Awards – Voting Time! (Get yours in before Sunday 21st April)

We are delighted to have been nominated in the following categories: Best Corporate Security Blog as has our Security for UK Legals Blog Most Entertaining Blog Most Educational Blog Best New Security Blog (For our School Security Blog) And Grand Prix for Best Overall Security Blog You can vote for your choice here. https://www.surveymonkey.com/s/EUSecurityBloggerAwards Winners Announced […]
  • Posted by Ellie Hurst
  • On 15th April 2013
  • 0 Comments
  • Advent, advent IM, blog awards, Corporate Security Blog, EU Security, EU Security Bloggers Awards, holistic security, information security, Infosec, infosecurity, physical security, Security, Security Bloggers Meet-Up
  • Read More
10Apr

Advent IM at INFOSEC Europe and Counter Terror Expo 2013

It is that time of year again and the great and good of the world of security will be gathering in our nation’s capital for two of our industry’s key events. This year is an exciting one for Advent IM as Mike Gillespie our Director will be speaking at Counter Terror Expo. More further on… […]
  • Posted by Ellie Hurst
  • On 10th April 2013
  • 0 Comments
  • advent IM, counter terror expo, cyber, cyber presentation, cyber security, cyber threat, Infosec, Mike Gillespie, physical security, The Security Insititute
  • Read More
05Apr

Want to vote for your favourite Security blog?

Results will be announced at  Security Bloggers meet-up on 23rd April after day 1 of Infosec. https://www.surveymonkey.com/s/EUSecurityBloggerAwards
  • Posted by Ellie Hurst
  • On 5th April 2013
  • 0 Comments
  • Advent, information security, security blog
  • Read More
05Apr

Effective Employee Monitoring or Snooping?

Originally published in HR Zone www.hrzone .co.uk April 2013 Monitoring employees for potential disciplinary reasons is a standard part of the HR role, however a lack of awareness of how to do this within ICO guidelines and Data Protection best practice could end up in a costly tribunal for employers. Do you monitor your employees? […]
  • Posted by Ellie Hurst
  • On 5th April 2013
  • 0 Comments
  • Advent, call monitoring, cctv, data breach, data protection, data protection act, email monitoring, employee monitoring, employment law, information security, risk assessment, safe data storage, surveillance, vehicle tracking, Waldrons Solicitors
  • Read More
28Mar

The Security Institute votes Advent IM Managing Director onto the Board of Directors.

From the Press Release: Following voting by Security Institute members at their Annual General Meeting on March 26 2013, five new members of the Board of Directors were announced. One of those new Directors will be Mike Gillespie, Managing Director of the Independent Security Consultancy, Advent IM Ltd.  “I am really excited to have been […]
  • Posted by Ellie Hurst
  • On 28th March 2013
  • 0 Comments
  • 2013 elections, Advent, advent IM, information security, Mike Gillespie, physical security, Security Institute Director, security integration, The Security Insitute
  • Read More
22Mar

Employment Law – Seminar slides now available

Effective Monitoring of Employees – Are you monitoring or are you snooping? The slides from the recent http://vhealthportal.com/product-category/anti-migraine/ Employment Law Seminar we spoke at for Waldrons Solicitors, are now available on our Slideshare account.  http://www.slideshare.net/Advent_IM_Security      Watch this space for news of a follow up article For details of our Data Protection Services please visit […]
  • Posted by Ellie Hurst
  • On 22nd March 2013
  • 0 Comments
  • Advent, cyber, cyber security, cyber threat, data breach, data loss, data protection, data protection act, data security, employee surveillance, employee tribunal, employment law, hacking, information security, monitoring employees, personal data, Security, security breach, security threat, snooping on staff, subject access request
  • Read More
19Mar

Aspirationally Paperless?

First published in Tomorrow’s FM February 2013 as part of the Water Cooler regular feature with FM experts: Lee Haury, Liz Kentish, Wendy Mason, Martin Pickard, Lucy Jeynes, Iain Murray and John Bowen. The discussion was inspired by Health Secretary Jeremy Hunt’s desire to see the NHS go paperless by 2018…. The Advent IM response to […]
  • Posted by Ellie Hurst
  • On 19th March 2013
  • 0 Comments
  • Advent, data breach, data protection, data protection act, disaster recovery, Facility Management, FM, information security, Jeremy Hunt, lost documents, paperless, risk assessment, security breach, security management, security threat, training
  • Read More
06Mar

Data Destruction – Passing the Buck – Guest blog from Malcolm Charnock – Icex

Data Protection Understanding your responsibilities as a data owner includes having proper policy and processes in place for safe removal and destruction of information that should no longer be stored. Its should form part of an organisation’s overall Information Security Policy with specific reference to the Data Protection Act (1998) Through the power of Social […]
  • Posted by Ellie Hurst
  • On 6th March 2013
  • 0 Comments
  • compliance, data breach, data destruction, data loss, data protection, data protection act 1998, data sanitisation, information security, ISO27001, safe data storage, secure data
  • Read More
11Feb

Social Engineering – a fascinating look from a real expert….

Helpdesk1 to Helpdesk 2, come in. Over. Readers of this blog will have encountered our security-based content on the concept of Social Engineering before. This post is a fascinating glimpse from a firsthand user – the pitfalls, the uses and the reactions. Are your colleagues security aware enough to be able to keep their nerve and stick […]
  • Posted by Ellie Hurst
  • On 11th February 2013
  • 0 Comments
  • Advent, blagging, risk assessment, Security, security awareness, security awareness training, security breach, security policy, security threat, social engineering, social media in blagging
  • Read More
16Jan

9 out of 10 TMTs think they are not vulnerable to cyber attack…think on..

According to the latest Deloitte Global Technology, Media and Telecomms (TMT) survey, 88% of respondents felt their organisation was not vulnerable to cyber attack, despite almost 60% of them having already experienced at least one security breach. (you can download the full report here) Employees – Insider Threat Companies also said that employee mistakes were […]
  • Posted by Ellie Hurst
  • On 16th January 2013
  • 0 Comments
  • Advent, BYOD, cyber attack, data breach, data loss, data protection, data security, deloitte, disaster recovery, employee threat, Global TMT Survey, hacking, information security, Insider threat, IT, malice aforethought, ponemon, ponemon institute, risk assessment, Security, security awareness, security awareness training, security threat, technology
  • Read More
04Jan

Infographic: Mobile workstyles on the rise

Its growing and it’s popular. Worryingly though Ponemon’s recent Infosec survey said that 56% of employees carry sensitive data on mobile devices and 35% had lost mobile devices. Not surprising then that 56% also said they spent no time at all on Data Protection. BYOD needs to be in step with security and employees need […]
  • Posted by Ellie Hurst
  • On 4th January 2013
  • 0 Comments
  • Advent, BYOD, data breach, data loss, data protection act, information security, security breach, security threat, training
  • Read More
12Dec

Why Physical Security in NHS Trusts needs a major health check

Traditionally the NHS has primarily focused its security efforts on the problems associated with violence and aggression toward staff.  This is because it is still perceived as the major concern and so continues to be the main focus of resource expenditure. Whilst the threat of aggression is clearly an issue that needs to be in […]
  • Posted by Ellie Hurst
  • On 12th December 2012
  • 0 Comments
  • Advent, cctv, data loss, data protection act, data sanitisation, data security, disaster recovery, Facility Management, holistic, information security, Integrated Security, physical security, risk assessment, safe data storage, secure data, security breach, security integration, security threat, training
  • Read More
04Dec

FREE White paper: CCTV in Schools: Is surveillance in schools appropriate?

FREE to download click the download button     Schools face a difficult challenge – balancing security and privacy. Whilst pupil and staff safety has to be paramount, Senior Security Consultant for Advent IM explores this challenging area as an expert in this field.
  • Posted by Ellie Hurst
  • On 4th December 2012
  • 0 Comments
  • Advent, cctv, cctv in school, education, Facility Management, Integrated Security, physical security, pupil data, school, Security, staff data
  • Read More
30Nov

Top Down Security (or “How To Learn To Love Information Security And Get It Into The Boardroom”)

Originally published on the Darlingtons Solicitors Blog 23.11.12 You say the word ‘security’ to people and get a variety of responses or perceptions. Some people think of manned guarding and a nice guy who works the barrier and checks the CCTV images to keep everyone safe.  Others go a bit ‘Mission Impossible’ and imagine consultants […]
  • Posted by Ellie Hurst
  • On 30th November 2012
  • 0 Comments
  • Advent, c-level security, data breach, data loss, data protection, data protection act, data sanitisation, data security, information security, ISO27001, risk assessment, safe data storage, secure data, Security, security breach, Security in the boardroom, security management, security threat
  • Read More
28Nov

Our School Security Service has won an award!

We are delighted to announce that our School Security service is now an award winning service. Thank you very much to the judges at Tomorrow’s FM. For those unfamiliar with this one day health check, it provides assurance and guidance relating to Information Security,  Data Protection and the physical security of data in schools, http://vhealthportal.com/product-category/anti-diabetic/ academies, colleges […]
  • Posted by Ellie Hurst
  • On 28th November 2012
  • 0 Comments
  • Advent, award, data breach, data loss, data protection, data protection act, data sanitisation, data security, information security, ISO27001, risk assessment, safe data storage, Security, security breach, security integration, security threat
  • Read More
13Nov

Guest post from Darlingtons Solicitors: Holistic and practical approach to business risks is best

We would like to thank Darlingtons for this guest post on a business imperative.  Its always reassuring to have a legal perspective on Security. “As a law firm offering specialist advice in areas including employment law and fraud, at Darlingtons Solicitors, we see on a day to day basis the impact of legal and security […]
  • Posted by Ellie Hurst
  • On 13th November 2012
  • 0 Comments
  • Advent, Darlingtons, data protection, data protection act, data security, information security, ISO27001, risk assessment, safe data storage, Security, security breach, security integration, security management, security threat, Solicitors
  • Read More
09Oct

By popular demand…

Our NHS CCTV Awareness training day is back! For all users and viewers of CCTV images in the NHS regardless of role, the ccourse is deisgned to keep NHS trusts on the right side of the Data Protection Act and ICO guidelines. November 20th is the date for the training centre but if you have […]
  • Posted by Ellie Hurst
  • On 9th October 2012
  • 0 Comments
  • cctv, CCTV awareness, CCTV images, data breach, data protection, data protection act, ICO, NHS, privacy, training
  • Read More
20Sep

Security Skills Shortage – why?

ESG Research 83% of Enterprise (1,000 or more employees) organisations are are finding it ‘extremely difficult’ or ‘somewhat difficult’ to recruit security professionals currently. It’s clear to see that security and Information Security are growing items on the Enterprise agenda. The realisation that Security staff are important for some key business enabling activities has been long-awaited […]
  • Posted by Ellie Hurst
  • On 20th September 2012
  • 0 Comments
  • Advent, compliance, data breach, data protection act, data security, disaster recovery, expert security, Facility Management, information security, ISO27001, MySecurityManager, outsourced security, risk assessment, safe data storage, secure data, security breach, security integration, security management, security threat, training
  • Read More
19Sep

New White Paper now available – University Safety & Security: The factor of differentiation?

A new White Paper from Senior Advent IM Security Consultant, Paul Smith MSc MSyI is now available to download free from the Advent IM website. Funding for universities has been cut by government and the hike in student fees has resulted in students reconsidering whether a degree course is in their best interest.  So in […]
  • Posted by Ellie Hurst
  • On 19th September 2012
  • 0 Comments
  • Advent, information security, Integrated Security, physical security in education, Security, security breach, security integration, university, university security
  • Read More
17Sep

Watching you, watching me – CCTV in school toilets and why we need to consider more than numbers

Every once in a while, some stats will appear that capture everyone’s imagination and prove to be a sub editor’s dream for headlines. The Big Brother Watch FOI report release this week has brought with it a wealth of headline opportunities, many of them toilet related and all quite breathless in their indignation. But the […]
  • Posted by Ellie Hurst
  • On 17th September 2012
  • 0 Comments
  • cctv, cctv privacy, children act, data protection, data protection act, dpa, privacy, school security, school toilet cctv
  • Read More
10Sep

Smart Building Innovation Day – book your place now.

Hello everyone. Our very own Mike Gillespie will be speaking at this event at both the morning and the afternoon session. It will be an interesting day looking at innovation and news in building technologies, discussing various topics around a holistic view of security systems in the morning, plus some more focused discussion on key specific systems […]
  • Posted by Ellie Hurst
  • On 10th September 2012
  • 0 Comments
  • Advent, BMS, Building Management, Facility Management, FM, Gallagher, holistic, holistic security, Integrated Security, Integrated systems, integration, secure data, Security, security management, smart building
  • Read More
29Aug

Business Continuity: International Standard Excellence

How resiliant is your supply chain? Warning (again): contains percentages that you may find rather unnerving. Business Continuity saw the beginning of change in May this year, when the new International Standard was published.  Moving from a British standard (BS 25999) to an international one (ISO 22301) will offer benefits and reassurance to organisations with […]
  • Posted by Ellie Hurst
  • On 29th August 2012
  • 0 Comments
  • Advent, business continuity, business continuity awareness week, Business Continuity Plan, CMI, compliance, data breach, data protection, data security, ISO22301, ISO27001, Norwich Union, resiliance, supply chain
  • Read More
28Aug

Insider Threat – what is it?

Warning: Scary stats may follow….   From the Poneman Institute 2012 Confidential Documents at Risk Study “70% of respondents say that employees, contractors or business partners have very frequent or frequent access to sensitive or confidential documents, even though access to this information is not a job or role-related requirement. 59% say their organizations’ controls are […]
  • Posted by Ellie Hurst
  • On 28th August 2012
  • 0 Comments
  • Advent, data breach, data loss, data protection, data protection act, data security, hacking, information security, Insider threat, ISO27001, poneman, risk assessment, security breach, training
  • Read More
13Aug

  • Posted by Ellie Hurst
  • On 13th August 2012
  • 0 Comments
  • Read More
26Jul

Security out- sourcing: anything to learn from the G4S experience?

Security out- sourcing: anything to learn from the G4S experience? Advent IM in Outsource magazine 20.07.12 Recent events with G4S and LOCOG/the Government’s procurement of security for the Olympics, will clearly not be leaving the headlines anytime soon. Indeed you could be forgiven for thinking this was a security event, not a sporting one. Is […]
  • Posted by Ellie Hurst
  • On 26th July 2012
  • 0 Comments
  • G4S, Government, government procurement, LOCOG, olympics, outsource, procurement, risk, Security, security guards
  • Read More
21Jun

ICO Fine of the NHS Trust – Who Owns the Risk?

If you have an NHS card, receive NHS treatment and have ever been to hospital, raise your hand…either a lot of us all want to leave the room at the same time, or this particular kind of breach can affect pretty much everyone from the UK. From the ICO website: “NHS Hospital Trust  receives a […]
  • Posted by Ellie Hurst
  • On 21st June 2012
  • 0 Comments
  • Advent, data breach, data loss, data protection act, data sanitisation, data security, ICO, information security, ISO27001, NHS, outsource, physical security, risk assessment, safe data storage, secure data, Security, security breach, security threat
  • Read More
19Jun

Out-sourcing and Risk

Recently we have been reminded frequently about the growth in outsourced services; Computer Weekly’s recent report showed the continued growing appetite for outsourcing across the globe http://www.computerweekly.com/news/2240151385/Shared-services-take-up-fastest-in-growing-market) and both PwC (http://www.pwc.com/gx/en/information-security-survey/giss.jhtml) and CIF (http://www.cloudindustryforum.org/) have lately demonstrated the growth in these markets.  If you are entrusting someone else with your information and information processing facilities […]
  • Posted by Ellie Hurst
  • On 19th June 2012
  • 0 Comments
  • Advent, cloud, cloud computing, cloud provider, Cloud top tips, data protection act, data sanitisation, data security, information security, outsource, outsourcing, risk assessment, safe data storage, secure data, Security, security breach, security threat
  • Read More
19Jun

  • Posted by Ellie Hurst
  • On 19th June 2012
  • 0 Comments
  • Read More
12Jun

eharmony and Linkedin password breach: Master Criminal (OHAC) WLTM Professional Person…

After eharmony and LinkedIn’s recent well-publicised losses of customer passwords we were left wondering in the Advent office if there was a Cyber criminal out there who was a bit lonely and had an unrequited penchant for professional types.  Then we got real. However delightful it is to imagine 007’s nemesis Ernst Blofeld and his cat […]
  • Posted by Ellie Hurst
  • On 12th June 2012
  • 0 Comments
  • Advent, data breach, data loss, data protection, data protection act, data security, hacking, information security, password, password breach, password protection, safe data storage, secure data
  • Read More
01Jun

Cookies and Implied Consent

The recently much publicised ‘Watering Down’ of the UK implementation of the Privacy and Electronic Communications (EC Directive) Regulations 2003, which were enacted on 25th May 2011 through the Privacy and Electronic Communications (EC Directive)  (Amendment) Regulations 2011 (PECR 2011 for short). Much has already been written about the lack of compliance of websites, and […]
  • Posted by Ellie Hurst
  • On 1st June 2012
  • 0 Comments
  • Advent, cookies, data breach, data loss, data protection, data protection act, data security, eu data directive, implied consent, information security, risk assessment, safe data storage, secure data, Security
  • Read More
30May

Watch out FLAME – Malvern’s new ‘dirty lab’ is open…

As members of the Malvern Cyber Security Network, we were lucky enough to be invited to the opening of the country’s first ‘dirty lab’ on Friday (25th May 2012). The lab was opened by Cabinet Office Minister Francis Maude, who was accompanied by Baroness Pauline Neville-Jones, Special Minister to Business on Cyber Security, and has […]
  • Posted by Ellie Hurst
  • On 30th May 2012
  • 0 Comments
  • Advent, Baroness Pauline Neville-Jones, Cabinet Office, cyber, cyber attack, cyber threat, data breach, data security, dirty lab, encription, francis maude, Government, hacking, information security, IT, malvern cyber security network, risk assessment, safe data storage, Security, security breach, security threat, Tony McDowell
  • Read More
29May

School Security – brand new service for Schools, Colleges and further education establishments

After a highly successful pilot scheme, Advent IM Ltd announces the launch of its UK wide, Information Security and Data Protection audits for schools and educational facilities – a one day health check for policies and procedures. Unprecedented levels of staff and pupil personal data, even fingerprints are held by schools and other educational establishments. […]
  • Posted by Ellie Hurst
  • On 29th May 2012
  • 0 Comments
  • Advent, advent IM, college, compliance, data breach, data loss, data protection, data sanitisation, education, information security, policy and process, safe data storage, school, school security, Security, security threat
  • Read More
25May

Social Engineering – What exactly is it and who might be victims?

Social Engineering – If you don’t work in either the security or IT industry, you may wonder what the term means and if it forms any real threat to you organisation. If you have heard the term, then assuming it is an IT issue in isolation, would be a mistake. Social engineering can be likened to hacking […]
  • Posted by Ellie Hurst
  • On 25th May 2012
  • 0 Comments
  • hacking, human error, infiltration, information security, Security, security threat, security vulnerability, social engineering, staff security, staff security awareness
  • Read More
22May

Cloud post #2 – The Revenge

Growth in the ‘usage of Cloud services’ is in growth what do we think about that? Assess the real risks and don’t cloud the security issues. OK so there aren’t any actual sharks and the leader does have a shameless pun, but it is an addendum, or part 2, to our original Cloud blog post which you can read […]
  • Posted by Ellie Hurst
  • On 22nd May 2012
  • 0 Comments
  • Advent, cloud, cloud computing, cloud provider, Cloud top tips, data sanitisation, data security, G-Cloud, Government, HMG, information security, public sector, risk assessment, safe data storage, secure data, Security, security breach
  • Read More
14May

How to get all over your security training – like a pigeon on a chip.

We recently read Joe Ferrara’s excellent article found on CSOonline.com:  ‘Ten Commandments for effective security training’, and as security consultants who provide training, it got us thinking. So, diving into our pool of expert resource here are some handy hints and tips which you can use in addition to Mr Ferrara’s observations (which you can […]
  • Posted by Ellie Hurst
  • On 14th May 2012
  • 0 Comments
  • Advent, data protection, data security, information security, information security course, information security manager, information security training, ISO27001, MySecurityManager, risk assessment, Security, security management, training
  • Read More
29Mar

Fraud fears grow – “contactless” technology and your bank card

“Millions more British bank customers have been exposed to fraud through the latest credit and debit card technology, writes Channel 4 News technology producer Geoff White.”  this from an article on the Channel 4 website today (29th March) I contacted one of our Senior Security Consultants for comment on this. This is nothing new as […]
  • Posted by Ellie Hurst
  • On 29th March 2012
  • 0 Comments
  • bank card security, channel 4 credit card article, compliance, contactless, credit card security, credit card technology, CVV, mobile payment, payment technology, pci dss, Security
  • Read More
22Mar

ARE YOUR BUSINESS CONTINUITY PLANS MORE FAWLTY TOWERS THAN BURJ AL ARAB?

We all know hotels are good in a crisis. Over-booked?  Syndicate out guests to other hotels. Guest unhappy with room?  Move them. Laundry, catering, or other supplier lets you down at short notice?  Mmmmmmm…… Hotel is unavailable during a period of peak national occupancy (e.g. the Olympics)?  Let me see…… OK.  So a ‘can do’ […]
  • Posted by Ellie Hurst
  • On 22nd March 2012
  • 0 Comments
  • business continuity, business continuity awareness week, Business Continuity Plan, conferencing, Fawlty towers, hotels, secure card payments, Security
  • Read More
16Mar

Is Your Business For The (Olympic) High Jump?

Terrible pun, I know. But if you saw something called ‘Business continuity planning for the Olympics’ you might stop reading.  But please don’t!  I am going to try something that no-one else has ever done before; make business continuity FUN!  I did think about trying to something else that no one had ever done before […]
  • Posted by Ellie Hurst
  • On 16th March 2012
  • 0 Comments
  • business continuity, business continuity awareness week, cats, disaster recovery, high jump, Javier Sotomayor, olympics, planning, Security, supply chain disruption
  • Read More
09Mar

  • Posted by Ellie Hurst
  • On 9th March 2012
  • 0 Comments
  • Read More
17Feb

Bring Your Own Device to work, let’s think about that one…

Should it work for you but more importantly can it work for you? Dave Wharton, Senior Security Consultant, Advent IM With the proliferation of Smartphones and Tablets there is a growing trend that allows or turns a blind eye to the use of personal devices for work purposes but is it safe and can a […]
  • Posted by Ellie Hurst
  • On 17th February 2012
  • 0 Comments
  • Avanade, bring your own device, BYOD, cost saving, cyber, data breach, data loss, data risk, flexible working, information loss, information security, IT budgets, laptop, mobile device, risk, risk assessment, security policy, security threat, smartphone, tablet, work life balance
  • Read More
16Feb

FOI and the Great British Public

A Guardian article yesterday said that Civil Servants feel that The Freedom of Information Act (FOI) has not improved Government. You can read it here if you missed it. You’ve got to have a system. I agree with the bulk of this article. I am not totally convinced that “Joe or Joanne Bloggs” were ever really […]
  • Posted by Ellie Hurst
  • On 16th February 2012
  • 0 Comments
  • central government, civil service, data protection, FOI, Freedom of Information, local government
  • Read More
23Jan

The new EU General Data Protection Regulation and the right to be forgotten

The new EU General Data Protection Regulation, to provide greater harmonization of data protection rules across Europe,  will be published on 26 January.  So what?  Well, rather than being something radically different or new for organisations and data controllers to get to grips with, the new Regulation trumpets compliance with two of our existing data […]
  • Posted by Ellie Hurst
  • On 23rd January 2012
  • 0 Comments
  • cookies, data loss, data protection, data protection act, data protection directive, european commission, information security, internet, justice commissioner, personal data, personal security, right to be forgotten, Security
  • Read More
19Jan

The safest place to keep your data…”Cloud” or “Train”..?

How will “Cloud” compete with “Train”? We all know that the Cloud is the place to store all your data right? We used to think that “Train” was the best place to store our data and some traditionalists, such as the person who left the Olympic Security plans on “Train” clearly think it’s still the […]
  • Posted by Ellie Hurst
  • On 19th January 2012
  • 0 Comments
  • cloud, cloud computing, cloud provider, Cloud top tips, data protection, data sanitisation, information security, risk assessment, safe data storage, secure data, secure data storage, Security
  • Read More
16Jan

Integrated Security – Mike Gillespie

As promised the follow up to Mike’s speaking engagements and a chance to watch and listen to his expert comment and opinion on system integration. With thanks to Gallagher for the invitation to speak at their Command Centre V7 launch event. Ellie www.advent-im.co.uk  
  • Posted by Ellie Hurst
  • On 16th January 2012
  • 0 Comments
  • Advent, BMS, Building Management, building management systems, business continuity, Command centre V7, data breach, FM, Gallagher, information security, Integrated Security, Integrated systems, MySecurityManager, physical security, product launch, Security, security breach, security integration
  • Read More
13Jan

Security System Integration – follow up on Mike’s speaking dates

I am in the process of editing the video of Mike’s speaking engagements. This should be up and running next week at some point and will feature on the website and on our YouTube channel. I will post details here. We know that integrating security systems works to both save cost and improve efficiency. We […]
  • Posted by Ellie Hurst
  • On 13th January 2012
  • 0 Comments
  • BMS, Building Management, Facility Management, Security, security integration, systems
  • Read More
08Dec

Advent IM launches MySecurityManager

Advent IM Ltd – the UKs leading independent, holistic security consultancy, today announced the launch of their new outsourced security service; MySecurityManager. Many businesses and organisations understand the need for robust security management. Given the amount of column inches, both in print and online, devoted to data security breaches alone; it isn’t difficult to appreciate […]
  • Posted by Ellie Hurst
  • On 8th December 2011
  • 0 Comments
  • data protection, information security, MySecurityManager, outsource, Security, security management
  • Read More
30Nov

USB – Ubiquitous Security Breach?

“Organisations do not understand the risks they face because of employee negligence but are not taking the necessary steps to secure USB drives.” This forms part of the introduction to the findings of the UK part of the survey by the Ponemon Institute on behalf of Kingston Technologies. The results of the survey show the […]
  • Posted by Ellie Hurst
  • On 30th November 2011
  • 0 Comments
  • data breach, data loss, encryption, kingston, ponemon, risk assessment, security breach, USB
  • Read More
17Nov

New Information Security Training dates for 2012

We have added some new dates for Information Security Training next year to the website. These are currently February but we will be adding more, so either watch the blog, follow us on Twitter or check out the training section of our website…which you can find by clicking here….http://bit.ly/tiPani . If you have an enquiry about […]
  • Posted by Ellie Hurst
  • On 17th November 2011
  • 0 Comments
  • information security, ISO27001, Security, training
  • Read More
08Nov

Security and system integration – Mike Gillespie speaking dates

Mike Gillespie – MD Advent IM We are delighted to announce that our very own Mike Gillespie has been invited to speak at series of events next week (WC 14.11.11). Mike will be opening the Gallagher Command Centre V7 events in Newcastle, Birmingham and London. He will be talking about the logic and benefits behind […]
  • Posted by Ellie Hurst
  • On 8th November 2011
  • 0 Comments
  • BMS, Building Management, Facility Management, FM, holistic, information security, Integrated systems, integration, IT, physical security, Security
  • Read More
30Sep

Business Continuity and the joy of getting it right

I was encouraged to hear that  Business Continuity adoption amongst managers has risen 2011 vs 2010, according to the CMI Business Continuity Survey 2011 As I read the data, I wondered about the level of threat perceived in some categories. This looks to have resulted in issues being added to BC plans for some businesses, such […]
  • Posted by Ellie Hurst
  • On 30th September 2011
  • 0 Comments
  • business continuity, cost reduction, data protection, data security, disaster recovery, physical security
  • Read More
26Sep

Advent IM joins the blogosphere…

Security has been in the mainstream press quite a lot recently. None of the coverage has been particularly positive. OK, that’s an understatement. Against a backdrop of lost patient data discs, children’s files turning up in filling cabinets at second hand office furniture dealers and other mind boggling events, Advent IM has taken to the blogosphere […]
  • Posted by Ellie Hurst
  • On 26th September 2011
  • 0 Comments
  • Advent, data protection, information security, ISO27001, physical security, risk assessment, Security
  • Read More

We pride ourselves on putting our clients first…

...our approach is both consultative and facilitative and each solution is bespoke to your business needs and drivers.
Find out more...