Vulnerability Testing

Vulnerability testing is the process of identifying vulnerabilities within a system. This could be a software system, a physical system, or even a mechanical system, and the testing can be targeted to focus on components that might be technical, physical, or even administrative in their nature. A vulnerability test is very like a risk assessment, […]
Sustainability in Business Technology

Sustainability in business technology refers to the incorporation of environmentally and socially responsible practices within the realm of technology-driven business operations. It involves utilizing technology in ways that minimize negative impacts on the environment, society, and economy, while also promoting long-term viability and success for the business. Here are some key aspects and strategies related […]
HOW INFRASTRUCTURE SYSTEMS SERVE THE BUILT ENVIRONMENT

The function of infrastructure systems is to support flows and activities of people, goods, materials, and information in the built environment. Built areas are created by the construction industry and its partners in real estate, banking, and development. Transportation and communications systems provide for flows of people, goods, and information. Water and energy sustain the […]
What is Business Process Management (BPM)?
Business Process Management (BPM) is a management approach that focuses on optimizing and improving business processes to increase efficiency, reduce costs, and improve quality. BPM involves analyzing, designing, implementing, monitoring, and optimizing business processes to ensure they are aligned with organizational goals and objectives. The key components of BPM include: BPM can help organizations achieve […]
SYSTEMS DEVELOPMENT AND ORGANIZATIONAL CHANGE
Building a new information system is one kind of planned organizational change. The introduction of a new information system involves much more than new hardware and software. It also includes changes in jobs, skills, management, and organization. When we design a new information system, we are redesigning the organization. System builders must understand how a […]
WHAT STOPS PEOPLE FROM BUYING ONLINE?

WHAT STOPS PEOPLE FROM BUYING ONLINE? A lack of trust and face-to-face interaction prevents many people from purchasing online. It’s a known fact that consumers require a greater level of trust and confidence when buying online than face to face. When you’re dealing with an unknown shop selling products of unknown quality, trust plays a […]
Protection of Systems: Working with Specialist Groups

It’s critical to your success to get involved in specialist groups that monitor and inform their members of what’s important and what’s changing in the world of information security. International organizations such as the Information Systems Security Association (ISSA) and the Information Systems Audit and Control Association (ISACA) are worth getting involved in, since they […]
Protection of Systems – What is Malware

Introducing Malware When we read about hacking in the news, we usually hear that massive corporates or government departments have been breached and some kind of corporate database has been stolen. We truly live in the age of the data breach , were hackers break into an organization’s infrastructure and purloin millions of records of […]
CREATING A SECURITY STRATEGY

The concept of a strategy is often used to describe the way the business will grow or develop over a long period of time with a number of specific targets it wants to achieve: grow by 30%, establish a 55% market dominance, expand into Europe or Australia, and so forth. Strategic targets are often pitched […]
Integration with Risk Management

Risk management is at the heart of everything we do in information security . The information security manager must advocate a risk based approach for every security-related decision taken by the business,including even the simplest decisions, such as whether or not to buy a firewall for the perimeter defense or purchase some antivirus software for […]