Blue Central Whitepapers


Sort by: Date | Company | Title


Information Security Policies, Standards and Procedure
By Blue Central | 13/3/2012

As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.

Download this now


Risk management: ensuring the security of your hosted information
By Blue Central | 29/2/2012

Organisations of all sizes are becoming victims to cybercriminals, data breaches, information theft and security risks. But before you go out and spend a fortune on security software, solutions and consultants, the starting point is to identify and measure your business’s exposure to those risks. In this whitepaper, “Exploring, Identifying and Measuring” risk, we examine how to identify risk and share an approach for identifying and measuring risk in your organisation.

Download this now


No Bull - What Customers Should Expect from Cloud Services
By Blue Central | 15/11/2011

This paper describes how a cloud Services User achieves the true benefits of cloud services and sends warning messages to the providers, hosting companies and telecommunications firms. It also provides clues on how a customer can gain better value from services offered by the new cloud companies and Hosting businesses.

Download this now
[]