Cyber Security Archive
With 5 million certified professionals, ITIL® is the most widely used ITSM (information technology service management) framework in the world. The latest version – ITIL 4 – was released by AXELOS® in February 2019. It’s a completely new approach to ITSM, and requires practitioners to update their …
Last week your CEO opened an email about chimpanzees in ties trashing an office. You’ve just learned the email contained malware, which has been exfiltrating valuable data to an IP address in Iran. After a brief panic attack, you start …
Let us assume you work for a company based in the U.S. Maybe you’ve heard of the European GDPR (General Data Protection Regulation). Perhaps you even heard about its requirements for cybersecurity and protecting personal information. Then you think to …
Have you ever wondered whether your organization should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a structured, comprehensive approach to managing information security risks. …
Information security management remains a serious issue for the legal sector, with law firms reporting an increase in targeted attacks in 2018. Large volumes of client funds and confidential information are irresistible to cyber criminals, so it is unsurprising that …
Completing a risk assessment is often the most challenging and difficult aspect of an ISO 27001 project. Regardless of the tools you use, the risk assessment must take into account many elements, such as assets, threats, vulnerabilities, and controls, and …
Cyber attacks are an increasingly serious risk for organizations, but many senior staff seem to believe that their organization won’t be targeted. They might say that their organization is too small to be on attackers’ radars, or that they don’t …
Certification to the increasingly popular international information security management standard ISO 27001 is now growing at 91% year-on-year in the USA (ISO survey), which is significantly higher than the global growth rate of 20%. With information security breaches now the …
It is a widely held belief that every organization’s website needs a corresponding privacy policy. However, this is not the case. Whether you need an online privacy policy depends on what your organization does, where it does it, and your contractual obligations. According …
When seeking to achieve certification to ISO 27001, organizations should avoid non-accredited certification bodies. Why? Non-accredited certification bodies typically offer a service that includes both consultancy and certification. No formally accredited certification body will offer this type of service, as …