Remove Accreditation Remove Audit Remove Information Remove Risk Management
article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

If using an ISO audit software tool to achieve ISO certification is on your compliance roadmap, here’s a quick primer to get you up to speed and jumpstart your ISO compliance efforts. The ISO 27001 family, published by the International Organization for Standardization, includes a set of standards for information security.

Audit 52
article thumbnail

Microsoft misfire: what can be learnt from the tech giant’s cybersecurity failings

SRM

The CSRB states that “throughout this review, the Board identified a series of Microsoft operational and strategic decisions that collectively point to a corporate culture that deprioritised both enterprise security investments and rigorous risk management.” More than half of that total revenue – $33.7

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Storage and Data Protection News for the Week of February 23: Updates from Clumio, Constellation Research, Hitachi Vantura, and More

Solutions Review

American Vision Partners Reports Data Breach Exposing SSNs and Medical Information of 2.3 million eye care patients are being notified that their Social Security numbers and other confidential information were compromised when hackers orchestrated a cyber-attack against Medical Management Resource Group, L.L.C. Read on for more.

article thumbnail

SOC 2 vs ISO 27001: Key Differences Between the Standards

Reciprocity

SOC 2 and ISO 27001 complement each other by giving you a strategy for securing your information landscape and for demonstrating the security of your environment. Designed by the International Standards Organization (ISO), ISO 27001 spells out industry standards for an information security management system (ISMS).

Audit 52
article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

The various niches of risk management have become a veritable alphabet soup of acronyms. Every Internet-connected device on a corporate network exposes the organization to the risk that someone might breach the company’s IT systems. As such risks proliferate and evolve, so do the ways to manage them.