How can SMEs resource ISO 27001?
Implementing ISO 27001 doesn’t have to be a costly and complicated piece of work: with the right tools you can implement the Standard yourself. Certification to ISO 27001 can bring organisations a host...
View ArticleThe key to implementing ISO 27001 in less than 6 months
As a company that helps organisations achieve ISO 27001 certification, the first question our clients typically ask is ‘How long does it take?’ While there is no definitive answer to this, in our...
View ArticleInfographic: how to tackle ISO 27001 documentation
With 172 requirements and 114 controls to sift through, there’s no doubt that creating and managing ISO 27001-compliant documentation will be a gruelling part of implementing the Standard....
View Article5 top tips for convincing senior management to implement an ISMS
Working in the information security industry, you understand how important it is to have a structured system for implementing cyber security best practice. Proving this to senior management is another...
View ArticleISO 50001: helping you meet European legislation
ISO 50001, the energy management system standard, is becoming a standard of choice for thousands of companies across Europe. According to the latest ISO Survey, nearly 12,000 organisations worldwide...
View ArticleImplementing an ISMS: what you need to know
First, what is an ISMS? An information security management system (ISMS) is a systematic approach to managing confidential or sensitive company information so that it remains secure (which means...
View Article5 PCI hurdles you need to overcome
When clients come to us for help with their PCI compliance project, they’re normally at a loss. And no wonder, when you consider these five hurdles: All the requirements are mandatory All 300 PCI DSS...
View ArticleHow to streamline your business processes into one manageable system
Organisations certified to an ISO standard are expected to implement and maintain a management system that not only meets the requirements of the standard involved, but also improves business...
View Article95% of organisations face significant challenges when implementing cyber...
According to ‘Cybersecurity Frameworks and Foundational Security Controls: A Survey of IT Security Professionals’, almost all organisations face significant challenges when implementing cyber security...
View ArticleRolls-Royce to pay £671m in bribery settlement
A UK court ruled last month that the UK-based engineering conglomerate Rolls-Royce must pay £671 million in order to settle corruption cases out of court. “We have co-operated fully with the...
View Article“Utterly corrupt” banker and five others found guilty of bribery and fraud
Six people, including two former managers with HBOS, were last week sentenced to a combined 47 years in jail for bribery and fraud. Lynden Scourfield pleaded guilty to six counts, including corruption,...
View ArticleCyber attack is top business continuity threat
Cyber attack is the top threat organisations are concerned about, according to the BCI Horizon Scan Report 2017. 88% of the 726 organisations that responded to the survey reported being “extremely...
View ArticleGDPR: How does your organisation measure up?
With the GDPR being enforced from 25 May 2018, organisations should be looking to kick-start their projects now. To help organisations assess their current stance against the Regulation and get their...
View Article3 approaches to tackling ISO 27001 documentation
For many organisations, the documentation stage is the most time-consuming part of their ISO 27001 project. For some, documenting an ISMS (information security management system) can take up to 12...
View ArticleVerizon’s 2017 Data Breach Investigations Report
It is the most highly anticipated cyber security report of the year and, for the tenth year running, Verizon has released its annual Data Breach Investigations Report (DBIR). The report is based on...
View ArticleTop 5 reasons you should be considering ISO 27001
ISO 27001 is the international standard that states best practice for an information security management system (ISMS). The standard is applicable to all organisations irrespective of their size, type...
View Article