ISO-27001-ISO-22301-blog

    Tag: “compliance”

    Comparison of SOC 2 and ISO 27001 certification
    All over the world, customers are becoming more and more concerned about how vendors working for them can affect their...
    All over the world, customers are becoming more and more concerned about how vendors working for them can affect their results. As a consequence, they increasingly require evidence showing that the services provided to them...
    Comparison of HIPAA compliance and ISO 27001 certification
    All over the world, organizations in the healthcare industry are becoming more and more interested in protecting their patients’ information;...
    All over the world, organizations in the healthcare industry are becoming more and more interested in protecting their patients’ information; but, in the United States, this need goes back to 1996, with the enforcement of...
    A success story about implementation of ISO 27001 and 9001: How online platform Doccle did it
    Is it possible for a SaaS company to implement ISO standards, and how and why should SaaS companies get certified?...
    Is it possible for a SaaS company to implement ISO standards, and how and why should SaaS companies get certified? On your way to success, this is an important step, and this is just what...
    How can ISO 27001 help you comply with SOX section 404
    A number of high-profile corporate and accounting scandals collapsed several big players like Enron and WorldCom, and played havoc on...
    A number of high-profile corporate and accounting scandals collapsed several big players like Enron and WorldCom, and played havoc on global investment market. In the wake of these scandals, U.S. SOX law was introduced to...
    How to perform an ISO 27001 second-party audit of an outsourced supplier
    To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may...
    To focus on their core business, many organizations rely on outsourced suppliers to perform support processes. While this approach may bring benefits like costs savings, and access to expert knowledge and state-of-the-art technology, it can...
    Should information security focus on asset protection, compliance, or corporate governance?
    Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all,...
    Traditionally, information security has been perceived as an activity that was built around protecting sensitive information assets – after all, this is what the first (2005) revision of ISO 27001, and its predecessor BS 7799-2,...