UK & Ireland Featured Project: Weld Inspection & Consultancy United Utilities Thirlmere (1737)

QEM Solutions were asked by United Utilities to assist with the review of the welding process and associated with the provision of the innovative steel E-joint.

Tell Me More...
Overseas Featured Project: Capita Symonds - Valve Inspections

QEM Solutions were contracted to carry 3rd party inspection and witnessing activities on a series of valves fabricated in Germany for a series of SGN contracts throughout Scotland.

Tell Me More...
We are QEM Solutions We are QEM Solutions

We are problem solvers. We are organisers. From the project start-up to the very final evaluations and analysis, we can bring enthusiasm to each and every part of your project.


News Spotlight Technology is nothing

“Technology is nothing. What's important is that you have a faith in people, that they're basically good and smart, and if you give them tools, they'll do wonderful things with them.” These are the words of the late Steve Jobs. Now, he was a man who knew a thing or two about technology. But – crucially – what the former CEO of Apple tells us is that there’s no point in technology for its own sake. Good technology is about giving smart people great tools.


ISO 27001 Information Security Management

With ever-increasing threats to digital information, a breach in information security can be catastrophic to any business, no matter what the scale or what industry they operate in.

QEM can review your current working practices and identify which aspects of your business are at risk.

ISO 27001:2013 is an international standard that provides a framework that helps organisations meet both their legal and contractual obligations associated with data protection and information security. Unlike the other international management system standards, (ISO 9001, ISO 14001 and ISO 45001)  ISO 27001 focuses on a list of mitigation controls that reduces or eliminates risks.  These controls are detailed in Annex A and include everything from access and physical perimeter management to cryptography and supplier assessments.

Implementing a robust information management system in accordance with ISO 27001 can dramatically reduce the following threats:

  • Cyber crime (attacks for monetary gain, such as phishing, malware intrusion, identity theft etc.)
  • Hacktivism, (attacks to disrupt activities in order to make a political or activist standpoint)
  • Active persistant threat, (such as a power cut or utility failure)
  • Insider threat, (a threat caused by an internal resource such as an employee or ex-employee)
  • Native state, (a state-driven attack on a political or geographical region)

QEM can reduce the CHAIN threats by applying the measures detailed in Annex A of ISO 27001 in a cost-effective and realistic manner.



Related Projects