Should your organisation choose to produce their business continuity management system using the ISO 22301 standard for either accreditation (as required by the Department for Education, education and skills funding contract requirements) or for compliance then it would make sense to use the same standard to guide the production of your disaster recovery management system […]
Tag: governance
This is the first of a series of related blogs posts, more to follow soon. Business continuity and disaster recovery planning is essential to ensuring the organisation can recover from an effect that impacts the business delivery processes. Business continuity planning is a senior leadership responsibility as it should have contingencies for all functional areas […]
IT support staff retention
Many colleges and universities have been experiencing difficulty in retaining their experienced and valued IT support staff. And with staff recruitment ever more challenging it’s become a priority to retain an IT support center’s most valuable asset, their support staff. Strategic asset While conducting over 150 infrastructure reviews and talking to IT teams all over […]
Author: Noel Davis, Subject specialist (Infrastructure programme) With the increasing prospect of power interruption over the coming months, it is essential that Jisc members have confidence in their disaster recovery (DR) plan, which should deal with such eventualities. Power recycling on IT equipment is usually managed by the IT team. It is usual for core […]
Pressure on energy supplies and centralised planning to manage energy consumption have been well documented in the media. It is likely that any energy rationing will be experienced as either a: ‘Blackout’, scheduled or unscheduled total loss of grid provided energy, most likely electricity, for a period. There is also the threat of ‘Brownout’, a […]
Defining the scope of your Cyber Essentials assessment will be difficult. Ideally it should to be done right at the beginning of the process and should apply to the whole organisation. Most likely though, it will develop as the answers to the section questions are collected and developed, and determining if mitigation is required […]
Cyber Essentials (CE) is a base level security accreditation that demonstrates a security posture that is compliant the National Cyber Security Centre (NCSC) recommended guidelines for small to medium enterprises (SME). It allows funders, customers and staff to have confidence that organisational policy, processes, user practices and IT infrastructure provide a risk assessed and […]
The Education and Skills Funding Agency (ESFA) had initially amended the contract for those who receive that funding to attain the ISO27001 Information Security Management certification. Jisc and the AoC made representations citing that the scale of work, redirection of resource and the very short time frame was an unrealistic expectation for the sector. […]
Over the last few months our small information strategy team has been starting to deliver on the transformational enterprise information strategy and its principles of; being safe with our information, being smarter with our information and using the right tools, policies and processes to deliver on the other two principles. The team has been applying […]
The results of the 11th annual information legislation and management survey were published last week. They show that for the first time since the survey’s beginnings in 2005 the number of Freedom of Information (FOI) requests that Higher Education institutions (HEIs) receive has slightly decreased from a yearly average of 218 per institution in 2014 […]