-

What is Secure by Design?
|
Read more: What is Secure by Design?Secure by Design – Managing Cyber Risk Secure by Design (SbD) is the UK Government approach to Cyber Security. Led by the Cabinet Office along with the Ministry of Defence (MOD), Secure by Design fundamentally changes the traditional accreditation model to one based on continual risk management and security design principles. Not just for security…
-

Microsoft 365 Cyber Security
|
Read more: Microsoft 365 Cyber SecurityAs highlighted in a previous blog post, DISX® was created by Logiq Consulting to overcome the challenges of working at OFFICIAL-SENSITIVE as a defence supplier. At Logiq we believe that you can build better and more secure systems in the cloud. Therefore, we assessed the market and selected Microsoft 365 as the Software as a…
-

DISX – MOD RLI Secure Communications
|
Read more: DISX – MOD RLI Secure CommunicationsWhen Logiq Consulting was established in 2018 the team had an initial problem to overcome: How can we work at the OFFICIAL-SENSITIVE level without relying on Ministry of Defence (MOD)-Furnished ICT? The team drew together significant experience in designing secure networks specifically to meet the security standard required to hold HMG sensitive information. This set…
-

Cyber Tabletop
|
Read more: Cyber TabletopCyber tabletop exercises are one of the simplest ways to understand how an organisation would respond to a real incident – before one happens. Most organisations have plans. Incident response, business continuity, disaster recovery. On paper, they often look complete. The difficulty is knowing whether they hold up once people have to use them under…
-

What is Ransomware?
|
Read more: What is Ransomware?Ransomware remains one of the most disruptive cyber threats organisations face. Its impact is rarely limited to IT systems. When it lands properly, it affects operations, delivery, and in some cases the organisation’s ability to function at all. Most organisations are aware of ransomware. Fewer have a clear sense of how it would play out…
-

Secure Communications with MOD – An SME’s Solution
|
Read more: Secure Communications with MOD – An SME’s SolutionUnderstanding that collaborating with, communicating securely, and supplying deliverables into the MOD would be a key output, the challenge of utilising secure IT, accredited by the MOD for use at OFFICIAL-SENSITIVE, would be vital. How do you communicate and work at OFFICIAL-SENSITIVE without reliance on MOD equipment and infrastructure? As a company, we were keen…
