Tag Cyber Security

Assent Awarded Cyber Essentials Certification for 3rd Year

Risk management consultancy Assent is pleased to announce it has been awarded Cyber Essentials Certification for a third consecutive year. As an Information Security and Cyber Security consultancy, we understand too well the importance of ensuring organisations implement robust technological…

Phishing: Are you a target?

Cybercriminals are well versed in finding prime targets to execute their attacks – and small businesses are considered ripe for the picking. Many SMEs consider themselves to be safe since they employ a ‘security-by-obscurity’ policy – they feel like since…

Top 5 Biggest risks to CyberSecurity in 2019

43% of cyberattacks target small to medium businesses, according to SCORE. With regards to malicious software – Macro-malware and ransomware were found to comprise a significant portion of these attacks. Even to this day many businesses lack employee awareness training…

The Psychology of a Cyber Attack: USB Drop Simulation

What is a USB Drop Simulation? A simulated USB drop attack is where you place a USB stick with tracking software installed in a commonly travelled area in the workplace, and see if employees follow company policy by handing it…

Assent Chooses Southend the #TechCityonSea for Growing Team

UPDATE 9th June 2020:  Our Central Admin office has now relocated to CEME Campus.  See our Contact Page for Details. Risk Management Consultants Assent have chosen its Southend-on-Sea office to expand its Technology Team. Director Robert Clements said: “Our business serves clients…

What are the requirements of ISO 27001?

GDPR Fees
ISO 27001 is the international standard for an Information Security Management system, but what is the meaning behind the number?   This post will give you a brief overview of ISO 27001 Requirements, and some advice on the easiest way…

5 Basic Cyber Security Measures

Cyber security can be a daunting term especially for those without a tech background, but there’s no doubting the importance of protecting your IT Systems in order keep the information you are responsible for safe. Here are 5 simple cyber…