Quantcast
Channel: Toolkits – IT Governance Blog
Browsing all 56 articles
Browse latest View live

How can SMEs resource ISO 27001?

Implementing ISO 27001 doesn’t have to be a costly and complicated piece of work: with the right tools you can implement the Standard yourself. Certification to ISO 27001 can bring organisations a host...

View Article


Image may be NSFW.
Clik here to view.

The key to implementing ISO 27001 in less than 6 months

As a company that helps organisations achieve ISO 27001 certification, the first question our clients typically ask is ‘How long does it take?’ While there is no definitive answer to this, in our...

View Article


Image may be NSFW.
Clik here to view.

Infographic: how to tackle ISO 27001 documentation

With 172 requirements and 114 controls to sift through, there’s no doubt that creating and managing ISO 27001-compliant documentation will be a gruelling part of implementing the Standard....

View Article

5 top tips for convincing senior management to implement an ISMS

Working in the information security industry, you understand how important it is to have a structured system for implementing cyber security best practice. Proving this to senior management is another...

View Article

Image may be NSFW.
Clik here to view.

ISO 50001: helping you meet European legislation

ISO 50001, the energy management system standard, is becoming a standard of choice for thousands of companies across Europe. According to the latest ISO Survey, nearly 12,000 organisations worldwide...

View Article


Image may be NSFW.
Clik here to view.

Implementing an ISMS: what you need to know

First, what is an ISMS? An information security management system (ISMS) is a systematic approach to managing confidential or sensitive company information so that it remains secure (which means...

View Article

Image may be NSFW.
Clik here to view.

5 PCI hurdles you need to overcome

When clients come to us for help with their PCI compliance project, they’re normally at a loss. And no wonder, when you consider these five hurdles: All the requirements are mandatory All 300 PCI DSS...

View Article

How to streamline your business processes into one manageable system

Organisations certified to an ISO standard are expected to implement and maintain a management system that not only meets the requirements of the standard involved, but also improves business...

View Article


95% of organisations face significant challenges when implementing cyber...

According to ‘Cybersecurity Frameworks and Foundational Security Controls: A Survey of IT Security Professionals’, almost all organisations face significant challenges when implementing cyber security...

View Article


Image may be NSFW.
Clik here to view.

Rolls-Royce to pay £671m in bribery settlement

A UK court ruled last month that the UK-based engineering conglomerate Rolls-Royce must pay £671 million in order to settle corruption cases out of court. “We have co-operated fully with the...

View Article

Image may be NSFW.
Clik here to view.

“Utterly corrupt” banker and five others found guilty of bribery and fraud

Six people, including two former managers with HBOS, were last week sentenced to a combined 47 years in jail for bribery and fraud. Lynden Scourfield pleaded guilty to six counts, including corruption,...

View Article

Image may be NSFW.
Clik here to view.

Cyber attack is top business continuity threat

Cyber attack is the top threat organisations are concerned about, according to the BCI Horizon Scan Report 2017. 88% of the 726 organisations that responded to the survey reported being “extremely...

View Article

GDPR: How does your organisation measure up?

With the GDPR being enforced from 25 May 2018, organisations should be looking to kick-start their projects now. To help organisations assess their current stance against the Regulation and get their...

View Article


Image may be NSFW.
Clik here to view.

3 approaches to tackling ISO 27001 documentation

For many organisations, the documentation stage is the most time-consuming part of their ISO 27001 project. For some, documenting an ISMS (information security management system) can take up to 12...

View Article

Image may be NSFW.
Clik here to view.

Verizon’s 2017 Data Breach Investigations Report

It is the most highly anticipated cyber security report of the year and, for the tenth year running, Verizon has released its annual Data Breach Investigations Report (DBIR). The report is based on...

View Article


Image may be NSFW.
Clik here to view.

Top 5 reasons you should be considering ISO 27001

ISO 27001 is the international standard that states best practice for an information security management system (ISMS). The standard is applicable to all organisations irrespective of their size, type...

View Article
Browsing all 56 articles
Browse latest View live