ISO/IEC 27001 – What’s new in Pipeline

ISO/IEC 27001 – What’s new in Pipeline

Introduction Now that it has been formally launched, the new ISO 27001 standard is available. The complete name of the standard is ISO/IEC 27001:2022 Information Security, Cybersecurity and Privacy Protection — Information ...
3 myths about ISO 27001 certification

3 myths about ISO 27001 certification

ISO 27001 is the international standard for an ISMS (information security management system), a best-practice approach to security that helps organisations achieve all of their data privacy compliance objectives. If you are ...
cyber insurance

Setting Up an ISO 27001-Compliant Remote Work Process

With the spread of more robust information and communication technologies, the possibility of remote work has become viable for a larger number of companies. However, allowing access to a company’s information systems ...
Security Boulevard
Why does GDPR Matter in the Tech and Media Industry?

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab ...

Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...
™

39% of UK CEOs admit that cyber attacks are unavoidable

A new study from KPMG has found that 39% of UK CEOs believe a cyber attack on their organisation is inevitable. This figure is likely a reaction to the upsurge in cyber ...
How to create an information security policy for ISO 27001

How to create an information security policy for ISO 27001

Organisations that are serious about preventing data breaches must create an information security policy. They contain a list of guidelines on how to handle with various incidents that might result in data ...

Identifying interested parties and their expectations for an ISO 27001 ISMS

There are many reasons for implementing an information security management system (ISMS), and identifying and understanding interested parties is crucial for an organisation to develop its information security. What is an ISMS? ...