Get 2 Documentation Toolkits for the price of 1
Limited-time offer – ends March 28, 2024
ISO 27001 vs. ITIL: Similarities and differences
IT services are one of the main pathways for information to flow through organizations, their clients and partners, and as...
IT services are one of the main pathways for information to flow through organizations, their clients and partners, and as legal and contractual requirements are increasingly including information protection demands (the healthcare industry is an...
Implementing capacity management according to ISO 27001:2013 control A.12.1.3
I’m sure you know, but it’s always about meeting agreed SLAs with your customers (internal and/or external) in the most...
I’m sure you know, but it’s always about meeting agreed SLAs with your customers (internal and/or external) in the most cost-effective manner. Appropriate performance under an acceptable price is the holy grail of any successful...
What to look for when hiring a security professional
Besides proper procedures and technologies, counting on good professionals can make all the difference during implementation and operation of any...
Besides proper procedures and technologies, counting on good professionals can make all the difference during implementation and operation of any process or project. The “Apollo 13” movie shows what skilled men can do when procedures...
Implementing restrictions on software installation using ISO 27001 control A.12.6.2
Currently, in all companies around the world, it is necessary to install software (operating systems, office applications, financial applications, applications...
Currently, in all companies around the world, it is necessary to install software (operating systems, office applications, financial applications, applications development, etc.). But, in general, the installation of this software is not sufficiently controlled, which...
Key performance indicators for an ISO 27001 ISMS
Think about a medical exam. Our objective is for the physician to tell us that our health is ok and...
Think about a medical exam. Our objective is for the physician to tell us that our health is ok and that we’ll live a long life, right? And how does the physician evaluate our health...
How to protect against external and environmental threats according to ISO 27001 A.11.1.4
Physical security plays a critical role in information protection, because even the best designed, implemented, and maintained technical and administrative...
Physical security plays a critical role in information protection, because even the best designed, implemented, and maintained technical and administrative controls, whether IT related or from some other area, are of little help if an...