UK & Ireland Featured Project: NGN - Design Management

QEM Solutions are assisting NGN with Design Co-ordination activities, to ensure successful project initiation and design management of all current NGN projects.

Tell Me More...
Overseas Featured Project: Capita Symonds - Valve Inspections

QEM Solutions were contracted to carry 3rd party inspection and witnessing activities on a series of valves fabricated in Germany for a series of SGN contracts throughout Scotland.

Tell Me More...
We are QEM Solutions We are QEM Solutions

We are problem solvers. We are organisers. From the project start-up to the very final evaluations and analysis, we can bring enthusiasm to each and every part of your project.

 

News Spotlight Covid-19: the race to achieve cyber security

In much the same way that the world is racing to develop a vaccine, so too is the business world racing to achieve cyber security against the pandemic. A recent study by Microsoft reports that in the first two months of COVID alone, a full two years’ worth of digital transformation took place. Why this huge leap forward? Because businesses the world over realised that cyber security is the key to productive remote working. And without it, nothing works.

Read more...

ISO 27001 Information Security Management

With ever-increasing threats to digital information, a breach in information security can be catastrophic to any business, no matter what the scale or what industry they operate in.

QEM can review your current working practices and identify which aspects of your business are at risk.

ISO 27001:2013 is an international standard that provides a framework that helps organisations meet both their legal and contractual obligations associated with data protection and information security. Unlike the other international management system standards, (ISO 9001, ISO 14001 and ISO 45001)  ISO 27001 focuses on a list of mitigation controls that reduces or eliminates risks.  These controls are detailed in Annex A and include everything from access and physical perimeter management to cryptography and supplier assessments.

Implementing a robust information management system in accordance with ISO 27001 can dramatically reduce the following threats:

  • Cyber crime (attacks for monetary gain, such as phishing, malware intrusion, identity theft etc.)
  • Hacktivism, (attacks to disrupt activities in order to make a political or activist standpoint)
  • Active persistant threat, (such as a power cut or utility failure)
  • Insider threat, (a threat caused by an internal resource such as an employee or ex-employee)
  • Native state, (a state-driven attack on a political or geographical region)

QEM can reduce the CHAIN threats by applying the measures detailed in Annex A of ISO 27001 in a cost-effective and realistic manner.

 

 

Related Projects