While ISO 27001 covers international information security management, for example ISO 27002 is intended to supplement the former with a greater focus on the many controls an organization could implement. The most important thing to know (and it might come as a relief) is that only ISO standards ...
Review what’s changed and how this may impact previously scoped ISO certifications. Learn how automation and tailored guidance can streamline compliance projects at scale across multiple business units and products throughout your organisation. Identify how to eliminate duplicativ...
Blancco Data Eraser solutions completely and permanently remove data from LUNs, virtual machines, removable media, drives, computers and mobile devices before they are recycled, reused or resold, helping you meet ISO 27001 requirements.Our tamper-proof erasure reports mean you can prove you’re in ...
Here's what you need to know about clauses that help inform your users about how you keep their information safe. We'll break down what your clause needs to include and show practical examples of such clauses, as well as where and how to display your own for maximum effectiveness. OurFr...
There are so many aspects of cybersecurity and cyber hygiene that it can be overwhelming. Then there's another angle: how do you know if what you're doing is enough? How do you know what the baseline is? Security frameworks can help you understand what this baseline is. Essentially, a ...
When a threat is detected, it can be instantly addressed through in-built remediation and risk assessment workflows, helping you maintain a strong security posture that’s resilient to first and even third data breaches. UpGuard’s Vulnerabilities module surfacing detected security risks. UpGuard also...
Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and...
Many exploitable vulnerabilities arise from hardware and software which is outdated or has limited or no support (whether managed in-house or by a third-party or related party). A well-known example is the Eternal Blue zero-day exploit that resulted in the spread of the WannaCry ransomware ...
In ISO 27001, in addition to Clauses 4.0 - 10.0 there is a further set of requirements detailed in a section called Annex A, which is referenced in Clause 6.0. Annex A contains 114 best practice information security controls. Each of these 114 controls needs to be considered. To be compli...
It also depends on how many features you'd like to add per year and how complex they are. App support is a must-have service even if you have no plans scaling up and adding new features into the application. The app maintenance cost will rise over time as your app gets more complex....