• (0)
    ISO-27001-ISO-22301-blog

    Tag: “risk”

    What does ISO 27001 Lead Implementer training look like?
    The ISMS (Information Security Management System) plays a very important role in every business these days. Since implementation of the...
    The ISMS (Information Security Management System) plays a very important role in every business these days. Since implementation of the ISMS can be a complex process (and usually differs in each industry sector), in order...
    How can ISO 27001 help protect your company against ransomware?
    Ransomware is a sophisticated malware that blocks users’ access to their files through the use of encryption. The attackers will...
    Ransomware is a sophisticated malware that blocks users’ access to their files through the use of encryption. The attackers will ask for a ransom to unlock the infected computer. Although ransomware has been known as...
    Does ISO 27001 implementation satisfy EU GDPR requirements?
    Lately, I’ve been asked questions like: “If ISO 27001 is implemented in my organization, will it fully comply with European General...
    Lately, I’ve been asked questions like: “If ISO 27001 is implemented in my organization, will it fully comply with European General Data Protection Regulation (EU GDPR) requirements?” and “Our company is ISO 27001 certified. Are we...