Cyber Security Archive
The rise of cyber attacks and data privacy concerns has information security a top priority for organisations. Many have chosen to mitigate the risk by implementing an ISMS (information security management system). Creating an ISO 27001-compliant ISMS is a big task, but the benefits it provides makes it an essential …
IT Governance led the world’s first ISO 27001 certification project and we’ve been at the forefront of the cyber security initiative ever since. Certification to ISO/IEC 27001 demonstrates to existing and potential customers that you have taken the necessary steps …
Amid the growing dominance of automated cyber crime tools like ransomware, it’s important to remember the dangers of traditional hacking methods such as MITM (man-in-the-middle) attacks. Let’s take a look at how it work and how you can guard against …
ISO 27001 qualifications are among the most popular in the information security industry, in part because of its versatility and broad scope. The Standard’s requirements apply to many different types of data protection practices, and the framework is used by …
If you’re new to ISO 27001, you might be finding it difficult to choose a training course that suits your needs. The first thing you need to do is work out the skills you want to acquire and the sort of …
Cyber security is an expensive exercise, with organisations typically spending 5% of their overall budget protecting their systems. Although many businesses will balk at such costs, particularly given the current economic crisis, investment in this area is one of the …
Phishing is one of the most frustrating threats we face. Most of know what it is and how it works, but we still get caught out. The scam, which involves criminals sending messages that masquerade as legitimate organisations, targets hundreds of millions …
Last year, a new version of ISO 27001 was published, introducing several changes in the way organisations are expected to manage information security. There are new requirements related to planned changes and how organisations should deal with them, as well …
What do Microsoft, Verizon, Apple, Google, Intel, and Amazon have in common? As well as all being Fortune 500 companies, they are all ISO 27001 certified. With a global growth rate of 20%, ISO 27001 has become the de facto …
In this blog, we explain the difference between a risk assessment and gap analysis, and advise you on how to complete each step effectively and in-line with your business needs.