Take the ISO 27001 course exam and get the EU GDPR course exam for free
LIMITED-TIME OFFER – VALID UNTIL SEPTEMBER 30, 2021
  • (0)
    ISO-27001-ISO-22301-blog

    Tag: “access control”

    What to consider in case of termination or change of employment according to ISO 27001
    As relationships between people and organizations evolve, it is natural for work situations to change. Concluded contracts lead to termination...
    As relationships between people and organizations evolve, it is natural for work situations to change. Concluded contracts lead to termination of employment relationships, and opportunities or gaps in roles or functions lead people to relocate...
    How two-factor authentication enables compliance with ISO 27001 access controls
    Access control is one of the cornerstones of security. If you cannot control who access what, you cannot ensure security...
    Access control is one of the cornerstones of security. If you cannot control who access what, you cannot ensure security at all. Because of that, access control stays in the main focus of security teams...
    Requirements to implement network segregation according to ISO 27001 control A.13.1.3
    Think about a house, or office, with only one big space where you can arrange all your loved and precious...
    Think about a house, or office, with only one big space where you can arrange all your loved and precious things the way you think most appropriate. Tempting, isn’t it? The flexibility to use the...
    How to handle access control according to ISO 27001
    Access control is usually perceived as a technical activity that has to do with opening accounts, setting passwords, and similar...
    Access control is usually perceived as a technical activity that has to do with opening accounts, setting passwords, and similar stuff – and it is true: access control does include all these things, but access...
    6-step process for handling supplier security according to ISO 27001
    Since more and more data is being processed and stored with third parties, the protection of such data is becoming...
    Since more and more data is being processed and stored with third parties, the protection of such data is becoming an increasingly significant issue for information security professionals – it’s no wonder that the new...