Tags » ISO27001

How interested do parties need to be?


Early on in the ISO27001:2013 standard, page 1 section 4.2 to be precise, is ‘Understanding the needs and expectations of interested parties’. An organisation needs to determine the parties relevant to their information security management system (ISMS) and what requirements they could have for information security. 166 more words

Information Security

IT security Standards and Frameworks

In this blog, I’m writing about IT security standards and Frameworks along with generic security certifications

SABSA

SABSA is a proven methodology for developing business-driven, risk and opportunity focused Security Architectures at both enterprise and solutions level that traceably support business objectives. 230 more words

Cyber Security

Countering ransomware - it's time to patch the human

Ransomware relies on human fallibility crypto-ransomware, malware that extorts money from victims by encrypting their files and systems until they pay a ransom, has been much in the news since WannaCry hobbled IT systems around the world last month. 259 more words

Security

Things to consider when selecting a new office


Thinking of moving to a new location? Here are some security items you should consider when selecting your perfect office.

Location

Consider neighbourhood public health and safety issues… 497 more words

Information Security

Cyber Essentials and ISO 27001 explained

At some point in your working life, you’ll probably come across these two terms, and you may want to know more about them. Look no further than… 39 more words

Published Items

Ransomware evolution: Locky and Sage combine in phishing

The ransomware marketplace is far from dissipating. New variants have already appeared in 2017 and researchers have detected that one new iteration, Sage, shares infrastructure with another already notorious malware, Locky, according to a PhishMe blog post. 155 more words