Product Blog Archive
When your organization begins trying to achieve ISO 27001 certification, you will need to prove your compliance with the Standard with appropriate documentation. One of the documents you must create and maintain is an information security policy. What is an information security …
One of the more laborious demands of the EU’s GDPR (General Data Protection Regulation) is the requirement to have dozens of documents available that prove you have the necessary policies and procedures in place. Understanding the GDPR doesn’t necessarily mean that …
A key part of your EU GDPR (General Data Protection Regulation) compliance project is producing documentation to demonstrate you are fulfilling your responsibilities under the Regulation. One such document is a privacy notice. If you’re arriving to the GDPR party late (the Regulation …
Documenting your compliance with the EU GDPR (General Data Protection Regulation) can be one of the most challenging parts of meeting its requirements. We’ve put together a short ‘how to’ guide for creating your own documentation and have provided a shortcut …
A data flow map should be one of the first things your organization produces as you prepare for the EU GDPR (General Data Protection Regulation). It helps you identify whether you store EU residents’ personal data – and therefore whether …
A crucial part of your EU GDPR (General Data Protection Regulation) project is producing documentation to demonstrate your compliance. One of those necessary documents is a data protection policy. To help you prepare one, we will outline what a data protection policy is, …
In May 2018, South Carolina became the first state to pass a cybersecurity insurance bill requiring insurers to establish and implement a cybersecurity program protecting companies and consumers from a data breach. The law created rules for South Carolina insurers, …
Companies starting out with an information security program often resort to spreadsheets when tackling risk assessments. There are, however, a number of reasons spreadsheets aren’t the best way to go: They’re prone to user input errors. Setting them up and …
This is Part 3 of our series on implementing information security risk assessments. You can read Part 1, ‘How to start your risk assessment the easy way’, here, and Part 2, ‘Simplifying the information security risk assessment process’, here. The …
This is Part 2 of our series on implementing information security risk assessments. You can read Part 1, ‘How to start your risk assessment the easy way’, here. If you’re undertaking an information security management system (ISMS) implementation project in …