by Gareth Shaw, Founder of Pera Prometheus If your organisation is involved in communications or IT infrastructure for the UK Ministry of Defence (MOD), you’ve likely come across the term SCIDA—the Site Coordinating Infrastructure Design Authority. It is a critical part of how infrastructure work is reviewed, approved, and delivered on MOD sites. According to the … Read more

by Gareth Shaw, Founder of Pera Prometheus It is useful for any company aiming to work with the UK Ministry of Defence (MOD), or other sensitive UK Government Departments, to understand the definition and requirements of Facility Security Clearance (FSC). FSC accreditation assures Contracting Authorities that your Organisation is capable of supporting high-value contracts that … Read more

Gareth Shaw, Founder of Pera Prometheus Consulting Ltd Securing contracts with the UK Ministry of Defence (MOD) offers significant opportunities for businesses within the Defence Industry. However, understanding and adhering to the MOD’s information and cyber security requirements are essential for successfully securing and maintaining these contracts. UK Defence Industry operates in a high-stakes environment where … Read more

–Gareth Shaw, Founder of Pera Prometheus Consulting Ltd My career has always revolved around keeping information safe. Now, as the founder of Pera Prometheus Consulting, I help organisations protect their valuable reputations and data. Today, I want to share some insights on Governance, Risk, and Compliance (GRC) in the UK, focusing on information and cyber … Read more

At Pera Prometheus, we understand the evolving challenges businesses face in securing their digital assets. Maintaining information security is becoming more challenging as threats continue to evolve, become more sophisticated.  Not all businesses have the resources to attain an in-house security team who will ensure that your business is protected and that you are meeting … Read more

Introduction No defence is 100% guaranteed and at the early stages of an organisation’s information and cybersecurity roadmap all are vulnerable but, knowing how to respond to an incident can minimise its impact. An organisation that responds well to an incident may be viewed positively by external observers. This is why effective incident management processes … Read more

Information and cyber threats are an ever-present danger to organisations, and while external attacks from hackers and malware often make the news, one of the most damaging risks comes from within—“Insider threats.” Whether intentional or unintentional, these threats can significantly impact business operations, data security, and an organisation’s reputation. Understanding Insider Threats An insider threat … Read more

Tackling Ransomware: Government's New Proposals to Protect the UK Government's Proposal

The UK government has recently announced a public consultation seeking views on three proposals aimed at striking a significant blow to the ransomware criminal business model. As outlined by the National Cyber Security Centre (NCSC), the consultation will consider three proposals: The ultimate goal is to protect UK CNI and the broader economy from the … Read more

Imagine trying to secure your home with a state-of-the-art alarm system while leaving a window open. This is the reality for many organisations today when it comes to their Operational Technology (OT) networks. Hackers have identified this gap and are increasingly exploiting OT systems, which are essential to industries such as energy, manufacturing, and transportation. … Read more