ISO-27001-ISO-22301-blog

    All posts by: Rhand Leal

    Does ISO 27001 help CCPA compliance?
    In the wake of the increasing concerns over privacy protection, the U.S. state of California passed a new regulation at...
    In the wake of the increasing concerns over privacy protection, the U.S. state of California passed a new regulation at the end of June of this year to ensure the protection of Californian consumers. Coming...
    What to consider in case of termination or change of employment according to ISO 27001
    As relationships between people and organizations evolve, it is natural for work situations to change. Concluded contracts lead to termination...
    As relationships between people and organizations evolve, it is natural for work situations to change. Concluded contracts lead to termination of employment relationships, and opportunities or gaps in roles or functions lead people to relocate...
    How to define context of the organization according to ISO 27001
    Since the release of the 2013 revision of ISO 27001, its clause 4.1 requiring the identification of the organizational context...
    Since the release of the 2013 revision of ISO 27001, its clause 4.1 requiring the identification of the organizational context has been causing quite some confusion, because it is rather vague. What must you consider...
    What to consider in security terms and conditions for employees according to ISO 27001
    A good way to ensure that people are aware of their roles and responsibilities in an organization is by defining...
    A good way to ensure that people are aware of their roles and responsibilities in an organization is by defining policies and procedures to be followed. But this solution has a limitation: they only cover...
    How to address opportunities in ISO 27001 risk management using ISO 31000
    Businesses are full of risks, and organizations should do their best to identify, evaluate, and treat all of them –...
    Businesses are full of risks, and organizations should do their best to identify, evaluate, and treat all of them – or at least the most relevant ones. This is called risk management, which can vary...
    How to perform background checks according to ISO 27001
    “The human factor is the weakest link in the security.” How many times have we already heard this sentence? How...
    “The human factor is the weakest link in the security.” How many times have we already heard this sentence? How many stories have we already heard about security incidents caused by human failure or inaction?...