ISO-27001-ISO-22301-blog

    All posts by: Rhand Leal

    Can ISO 27001 help your organization in a DDoS attack?
    In a connected world where hundreds of transactions are made every minute, every second your systems are down or inaccessible...
    In a connected world where hundreds of transactions are made every minute, every second your systems are down or inaccessible may represent a significant impact on your organizations’ business. And, while prevention of infrastructure failures...
    How can ISO 27001 help you comply with SOX section 404
    A number of high-profile corporate and accounting scandals collapsed several big players like Enron and WorldCom, and played havoc on...
    A number of high-profile corporate and accounting scandals collapsed several big players like Enron and WorldCom, and played havoc on global investment market. In the wake of these scandals, U.S. SOX law was introduced to...
    European 2017 Revision of ISO/IEC 27001: What has changed?
    Released at the beginning of April 2017 by BSI (the British Standards Institution), the standard BS EN ISO/IEC 27001:2017 is...
    Released at the beginning of April 2017 by BSI (the British Standards Institution), the standard BS EN ISO/IEC 27001:2017 is a corrigendum over previous standard BS ISO/IEC 27001:2013. It has raised some concern among organizations...
    How to perform an ISO 27001 second-party audit of an outsourced supplier
    To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may...
    To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may bring benefits like costs savings, and access to expert knowledge and state-of-the-art technology, it can...
    ISO 27001 vs. Cyber Essentials: Similarities and differences
    In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection,...
    In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection, but differences in resources and knowledge often result in data breaches because of the failure...
    Which security clauses to use for supplier agreements?
    Running a business on your own these days is practically impossible. Maintaining high levels of performance in every aspect of...
    Running a business on your own these days is practically impossible. Maintaining high levels of performance in every aspect of your business to stay competitive means draining precious resources that would be better invested in...