Sep 2, 2025
4 min read
Introduction to Cyber Security
(#16 of 17)
Exploring in more detail the different types of discrepancies that can undermine control effectiveness, including issues with implementation, training, and a changing threat landscape. It provides practical insights into how to detect these gaps and offers a clear, action-oriented remediation checklist to ensure continuous improvement in cybersecurity defences.
Jul 29, 2025
3 min read
Introduction to Cyber Security
(#10 of 17)
To build proactive cybersecurity defenses, a foundational understanding of the threat landscape is required. By comprehending common cyber threats like phishing, ransomware, and viruses, an organization can inform risk assessments and prioritise security controls.
Jul 29, 2025
3 min read
Introduction to Cyber Security
(#9 of 17)
ICT assets include hardware, software, information, infrastructure, skilled personnel, and outsourced services. An asset register systematically documents these, forming the foundation of IT asset management. It tracks lifecycle, reduces risks, prevents waste, and documents vulnerabilities. Maintaining a detailed register ensures risk management focuses on protecting the organisation’s most valuable resources.