Top 10 risks to include in an information security risk assessment

Top 10 risks to include in an information security risk assessment

An ISO 27001 risk assessment should have five key steps. In this blog, we look at the second step in the process: identifying the risks that organisations face. How to identify threats You ...
The Statement of Applicability in ISO 27001

The Statement of Applicability in ISO 27001

When it comes to ISO 27001 compliance, the SoA (Statement of Applicability) is one of the key documents you must complete. It identifies the controls you have selected to address information security ...
Conduct simple, fast and accurate risk assessments with vsRisk

ISO 27005 and the risk assessment process

ISO 27005 describes the risk management process for information and cyber security. It’s part of the ISO 27000 series, which means its advice is part of a wider set of best practices for to protect ...
vsRisk - Risk Treatment Plan ISO 27001

How to produce a risk treatment plan

The risk treatment plan is one of the mandatory documents that must be produced as part of a certified ISO 27001 ISMS (information security management system). It provides a summary of each ...
Risk terminology: Understanding assets, threats and vulnerabilities

Risk terminology: Understanding assets, threats and vulnerabilities

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face ...
Sample risk assessment

The best risk assessment template for ISO 27001 compliance

ISO 27001 is the most popular information security standard worldwide, and organisations that have achieved compliance with the Standard can use it to prove that they are serious about the information they ...
Managing risks according to Clause 6 of ISO 27001

Managing risks according to Clause 6 of ISO 27001

| | Latest news
Clause 6 of ISO 27001 is one of the most important aspects for compliance, as it covers the actions you must take to address information security risks. Everything else you do to ...
What to expect from Stage 1 and Stage 2 ISO 27001 audits

What to expect from Stage 1 and Stage 2 ISO 27001 audits

Those who are just getting to know ISO 27001 will no doubt find the audit a daunting prospect. It’s a big, complex task that can be tricky for even experienced professionals. But, ...

Monthly cyber security review: December 2019

| | Latest news
We’re back with another round-up of some of the most notable information security stories of the past month. In this edition, we discuss a hospital employee who abused their power to contact ...

Monthly cyber security review: November 2019

| | Latest news
As we enter December, many organisations slow down as they turn their attention to Christmas. Office parties, secret Santas and discussions of when it’s acceptable to put the tree up start to ...