fbpx

Data Classification – How to get it right

By |2024-07-22T13:41:51+01:00July 22nd, 2024|Information Security, ISO27001 Certification, ISO27001 Implementation, policies and procedures, Risk Assessment|

Data Classification: How to get it right Not all business data is created equal. Some information is more valuable—and more sensitive—than others. This is where data classification becomes important. It helps separate the low risk information from the highly sensitive and confidential. What is Data Classification? Data classification is the process of categorising business information based on its level of sensitivity and the impact to the organisation should that data be disclosed, altered, or destroyed without authorisation. It's about understanding what data you have, where it [...]

Information Security Roles and Responsibilities in ISO 27001

By |2024-07-14T12:47:50+01:00July 15th, 2024|BUSINESS, Information Security, ISO27001 Certification|

Information Security Roles and Responsibilities in ISO 27001 ISO 27001 is the international standard for information security management systems (ISMS). A key aspect of implementing ISO 27001 is clearly defining roles and responsibilities related to information security and the management system. This ensures that all aspects of the ISMS are properly managed and that there's accountability throughout the organisation. There are some common roles which should be considered in every organisation considering obtaining ISO27001 Certification and they are: 1. Top Management - This could be Board [...]

ISO27001 – Control 5.11 – Return of Assets

By |2024-06-14T14:34:48+01:00June 16th, 2024|Information Security, ISO 27001 Controls, ISO27001 Certification, ISO27001 Implementation|

ISO27001 - Control 5.11 - Return of Assets Control Personnel and other interested parties as appropriate should return all the organization’s assets in their possession upon change or termination of their employment, contract or agreement. What this means When a member of staff, contractor or supplier reaches the end of their employment or contract period, there should be a process in place to ensure that all the organisations assets are returned. This includes devices such as laptops and mobile phones as well as business paperwork (held [...]

ISO27001 – Control 5.10 – Acceptable use of information and other associated assets

By |2024-05-31T16:10:27+01:00June 3rd, 2024|Information Security, ISO 27001 Controls, ISO27001 Certification, ISO27001 Implementation|

ISO27001 - Control 5.10 - Acceptable use of information and other associated assets Control Rules for the acceptable use and procedures for handling information and other associated assets should be identified, documented and implemented. What this means This is all about ensuring that information and associated assets are appropriately protected, used and handled. You should have a procedure which documents the rules for acceptable use and the protection of assets. The organisation should identify the staff and external party users using or having access to the [...]

ISO27001 – Control 5.9 – Inventory of information and other associated assets

By |2024-05-28T12:11:45+01:00May 28th, 2024|Information Security, ISO 27001 Controls, ISO27001 Certification, ISO27001 Implementation|

ISO27001 - Control 5.9 - Inventory of information and other associated assets Control An inventory of information and other associated assets, including owners, should be developed and maintained. What this means Organizations should develop and maintain an inventory of their information assets and other associated resources, including details about who owns each asset. The purpose is to identify all the organization's important information and assets in order to properly secure them and assign clear ownership responsibilities. Ownership should be assigned when assets are created or when [...]

ISO27001 – Control 5.8 – Information Security In Project Management

By |2024-05-13T15:03:48+01:00May 13th, 2024|Information Security, ISO 27001 Controls, ISO27001 Certification, ISO27001 Implementation|

ISO27001 - Control 5.8 - Information Security in Project Management Control Information security should be integrated into Project Management. What this means When planning and executing projects, it's essential to integrate information security practices throughout the entire project lifecycle. Information security risks can derail projects and jeopardise deliverables if not addressed proactively. This can be applied to any type of project regardless of its complexity, size, duration, discipline or application area (e.g. a project for a core business process, ICT, facility management or other supporting processes). [...]

ISO27001 – Control 5.7 – Threat Intelligence

By |2024-04-26T17:58:33+01:00April 26th, 2024|Cyber Security, Information Security, ISO 27001 Controls, ISO27001 Certification, ISO27001 Implementation|

ISO27001 - Control 5.7 - Threat Intelligence Control Information relating to information security threats should be collected and analysed to produce threat intelligence. What this means Organizations should gather and analyze information about security threats to understand the risks they face. This "threat intelligence" can help them take appropriate actions to prevent attacks or reduce the impact of an attack. Threat intelligence has three levels: Strategic - High-level information about the overall landscape of threats and attackers Tactical - Details on the methods, tools, and technologies [...]

How to Choose an ISO27001 Certification Body

By |2024-01-03T12:48:35+00:00January 3rd, 2024|ISO27001 Certification|

Choosing the Right ISO 27001 Certification Body Gaining ISO 27001 certification evidences that your organisation has implemented a robust information security management system (ISMS). A key decision to make on your ISO 27001 journey is selecting which certification body to work with for the formal certification process. Here are some tips on choosing the best ISO 27001 certification body for your needs: Make Sure They Are UKAS Accredited The United Kingdom Accreditation Service (UKAS) provides oversight to certification bodies operating in the UK. Confirm that potential [...]

What is the purpose of Internal Audit for ISO27001 Certification?

By |2023-12-07T17:09:27+00:00December 7th, 2023|Internal Audit, ISO27001 Certification, ISO27001 Implementation|

What is the purpose of Internal Audit for ISO27001 Certification? The Key Role of Internal Audits in ISO 27001 Compliance Obtaining ISO 27001 certification provides numerous benefits for organisations, demonstrating that your organisations is serious about information security. To achieve certification, an extensive information security management system (ISMS) needs to be implemented and rigorously maintained. A crucial component for maintaining an effective ISMS as required by ISO 27001 is conducting regular comprehensive internal audits. Internal audits examine all aspects of your security controls, policies, and procedures [...]

Is Getting ISO 27001 Certification Difficult?

By |2024-02-23T09:57:10+00:00November 19th, 2023|ISO27001 Certification, ISO27001 Implementation|

Is Getting ISO 27001 Certification Difficult? Introduction: ISO 27001 is the most widely recognised standard for information security management systems (ISMS). It provides a framework for organisations to manage their information security risks. Many companies now seek ISO 27001 certification to demonstrate their commitment to security. But is getting certified difficult? Let's explore some of the main concerns. The Implementation Process Implementing the controls and processes required by ISO 27001 can seem daunting initially. It requires defining a formal information security policy, classifying assets and recording [...]

Go to Top