How vsRisk can simplify your ISO 27001 risk assessment

An ISO 27001 risk assessment is at the core of your organisation’s ISMS (information security management system). The Standard is explicit in requiring that a risk management process be used to review and confirm security controls in light of regulatory, legal and contractual obligations.

Spreadsheets are a common and seemingly cost-effective solution to tackle risk assessments, but the leave a lot of room for error.

What is vsRisk?

vsRisk is a risk assessment software tool – created by ISO 27001 industry experts – that delivers simple, fast, accurate and hassle-free risk assessments year after year.

5 reasons to use vsRisk

  1. vsRisk is easy to use
    Your risk assessment procedure will be as simple as choosing a few options and walking through the risk assessment wizard for each asset you are assessing.


  1. vsRisk is streamlined and accurate
    You will avoid the human errors that afflict spreadsheets. vsRisk is simple to use, fast, accurate and hassle-free.


  1. vsRisk can be used by every organisation
    Organisations of any size can use vsRisk and have multiple users working at the same time. vsRisk is robust and generates six audit ready reports that can be updated year after year.


  1. vsRisk can save 80% of your time
    Save-time and reduce the complexity that using spreadsheets can create. As you can see in the table below, vsRisk can save 80% of your time and ensures return on investment.
  2. vsRisk saves you money
    The table above shows how much money your organisation could save if you choose to use vsRisk over conventional methods for your risk assessment.
  • Cristina Lie a vsRisk Multi-user customer chose our risk assessment software tool because of the ease and simplicity of use, she was also impressed by the reports that can be shared amongst her colleagues. Before that Cristina used Excel and she was frustrated by how time consuming it was and how it lacked structure.


If you would like to know more about vsRisk, please follow the link



*** This is a Security Bloggers Network syndicated blog from Vigilant Software Blog authored by Ingrid Then-Guiraut. Read the original post at: