• (0)
    ISO-27001-ISO-22301-blog

    All posts by: Rhand Leal

    ISO 27001 vs. Cyber Essentials: Similarities and differences
    In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection,...
    In the Internet environment, big, medium, and small businesses all face similar risks, and many regulatory demands enforce information protection, but differences in resources and knowledge often result in data breaches because of the failure...
    Which security clauses to use for supplier agreements?
    Running a business on your own these days is practically impossible. Maintaining high levels of performance in every aspect of...
    Running a business on your own these days is practically impossible. Maintaining high levels of performance in every aspect of your business to stay competitive means draining precious resources that would be better invested in...
    Defining the ISMS scope if the servers are in the cloud
    In the article How to define the ISMS scope we show that scope definition of an Information Security Management System...
    In the article How to define the ISMS scope we show that scope definition of an Information Security Management System (ISMS) requires clear understanding about what to protect to minimize risks of information compromise, and...
    How ISO 27001 can help suppliers comply with U.S. DFARS 7012
    DFARS 7012 is an example of how customers’ concerns about protecting their information in the custody of suppliers and outsourced...
    DFARS 7012 is an example of how customers’ concerns about protecting their information in the custody of suppliers and outsourced services has led to the establishment of ever more complex security requirements for those who...
    How to demonstrate resource provision in ISO 27001
    The availability of resources is a critical point in any endeavor. You can have the best ideas and the best...
    The availability of resources is a critical point in any endeavor. You can have the best ideas and the best intentions, but if you lack resources you are doomed to failure. So, it may seem...
    How to apply information security controls in teleworking according to ISO 27001
    Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as...
    Allowing employees to work away from the office, i.e., outside of the physical premises of the organization (otherwise known as “teleworking”) is becoming a common practice in the way to do business today. The ability...