Year: 2021

Sort by:

We are proud to be selected for Tech Nation’s Upscale 7.0

We’re delighted to announce that we’ve been recognised by Tech Nation as one of the UK’s Leading Scale-ups and asked to participate in its Upscale 7.0 programme. It’s the second time we’ve been invited to take part in a programme by the UK network for tech entrepreneurs.

Keep reading >

How to write an internal audit report for ISO 27001

An Internal audit report structure for ISO 27001 is something you need to know. Creating an effective and professional internal audit report is essential for any successful ISO 27001 implementation. A good quality internal audit report is a snapshot of the overall implementation process and records the status of your ISO 27001 implementation in the certification lead up, along with details of areas that still need addressing.

Keep reading >

How to prepare for an internal ISO 27001 audit – The auditee’s perspective

Internal audits of ISO 27001 assist organisations in ensuring that their requirements and those required by the standard are being met. The ISO 27001 internal audit is firstly the process of determining if a company has the necessary procedures, processes, protocols, and people to protect its information and its information management systems against the ISO 27001 standard.

Keep reading >

What are the different types of ISO 27001 internal audits?

An audit of your ISMS allows for the management system to be reviewed by an objective and competent auditor. It will test the elements of the ISMS based on standard requirements. It will also allow more insight into the organisation’s current level of reaching its needs and corporate objectives.

Keep reading >

How to avoid common ISO 27001 internal audit mistakes

Internal audits of the management system are a mandatory requirement of ISO 27001 and all other mainstream ISO standards. The requirements are very minimal, however when examined objectively and the detail of them is very un-prescriptive.

Keep reading >

What is the ISO 27001 audit process?

Audits are commonly used to ensure that an activity meets a set of defined criteria. For all ISO management system standards, audits are used to ensure that the management system meets the requirements of the relevant standard, the organisation’s own requirements and objectives, and remains efficient and effective. It will be necessary to conduct a programme of audits to confirm this.

Keep reading >

How do I explain an ISMS to my colleagues?

An information security management system (ISMS) is essentially a cohesive collection of documents, systems and data that combine to enable the appropriate measures to be taken to manage information security to be managed for your business or organisation.

Keep reading >

ISO 27001 Simplified: Assured Results Method (ARM) Guide

One of the most common questions organisations that are new to information security management ask is ‘where do I start with ISO 27001:2013?’ To achieve independent certification of the internationally recognised standard, there are about 140 things to complete. Some take 2 minutes, and others can take days or weeks, depending on the starting point and complexity of the organisation. So it’s no wonder that busy individuals might feel overwhelmed and unsure about what to do – and the order to do it in – while optimising resource, cost and risk.

Keep reading >

How to maintain your ISO 27001 certification

Even with the best help and support available, achieving ISO 27001 certification is a challenging process. It takes time, effort and real organisational commitment. So once you’ve succeeded, it can be tempting to celebrate and then just stop thinking about it all.

Keep reading >

How the Colonial Pipeline hack makes the case for ISO 27001

We’ve already talked briefly about last week’s Colonial Pipeline hack. It’s one of the most impactful ransom attacks in history. Even the hackers, DarkSide, felt they had to apologise for its huge unintended consequences. Now it turns out that they were apologising all the way to the bank. Their victims have paid them a five million dollar ransom.

Keep reading >