Show me desktop version

 

The ISO 27001 & ISO 22301 Blog

 

/wp-content/uploads/2015/03/Caution2-wpcf_110x110.png

8 Security Practices to Use in Your Employee Training and Awareness Program

This might be hard to believe, but it is true: 59% of data breaches are happening not because of some smart hacker who wants to do harm to your company; those breaches are happening because of your own employees. As …

Read More ...
/wp-content/uploads/2015/02/VauneCarr-wpcf_66x66.jpg

What Can War Teach Us About Mainframe Security?

The mainframe environment, or Big Iron, continues to grow at a rate of about 5% per year according to recent predictions. While experts have historically considered the Mainframe to be the safest environment from a Cybersecurity perspective, one has to …

Read More ...
/wp-content/uploads/2015/02/3-essential-elements-of-organization-wpcf_110x110.png

How a change in thinking can stop 59% of security incidents

According to Experian 2015 Second Annual Data Breach Industry Forecast, the largest number of security incidents are happening because of human error and malicious insiders: “… the majority of data breaches originate inside company walls. Employees and negligence are the …

Read More ...

Small business guide to cyber security: 6 steps against the data breach

Lately we’ve seen many large companies getting hacked: Anthem, Sony, and Target to name just a few. The number of data breaches increased 27.5% in 2014, so measures against these types of security incidents are on the rise in large …

Read More ...

How to perform business continuity exercising and testing according to ISO 22301

Exercising and testing of business continuity plans is quite a controversial topic – some people say that it costs too much, while others maintain that it has no purpose because they cannot perform the full testing, anyway. Well, both of …

Read More ...
/wp-content/uploads/2015/01/Infographic-Data-breaches-US-2014-EN-ver-0-5-edited1-wpcf_110x110.jpg

2014 Data Breaches in the United States

Read More ...

Explanation of the basic terminology in ISO standards

When I deliver various trainings for ISO 27001 and ISO 22301, it always turns out that one of the hottest topics is about which policies and procedures need to be documented, and which do not. Of course, there are some other …

Read More ...

Top 10 information security bloggers in 2014

If you want to stay on top of cybersecurity / information security news and insights, here are the blogs that I found the most useful. I listed here only the blogs written by independent authors (blogs that were not edited …

Read More ...

Risk assessment vs. internal audit in ISO 27001 and ISO 22301

Quite often I see people searching for ISO 27001 or ISO 22301 checklists for performing the internal audit; however, they expect those checklists to help them with, e.g., which information does the organization have, who has access to it, how is it …

Read More ...

Who should be your project manager for ISO 27001/ISO 22301?

If you’re planning to start your ISO 27001 and/or ISO 22301 project, you’re probably wondering who could lead such a complex project – what type of person do you need, with which authorities, and should you go with someone in-house …

Read More ...
Show posts:
Free live support
Request callback
Time to call:

Or call us directly

Toll-Free (U.S. and Canada): 
1-888-553-
2256