article thumbnail

Microsoft misfire: what can be learnt from the tech giant’s cybersecurity failings

SRM

Thankfully, there are several key steps you can take to implement a cybersecure culture in your organisation, and it starts with knowing where your business stands. A cybersecurity audit helps you avoid burying your head in the sand, giving you a clear picture of how your security fares, and what steps need to be taken.

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

ISO 27001 compliance can be confusing because the sheer volume of standards is overwhelming, but the right program can ensure business continuity. If using an ISO audit software tool to achieve ISO certification is on your compliance roadmap, here’s a quick primer to get you up to speed and jumpstart your ISO compliance efforts.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When is an ISO not an ISO?

Plan B Consulting

This week PlanB Consulting are celebrating passing part 2 of our audit and being certified to ISO 9001. With an ISO, you are regularly audited and it keeps you honest. They had a number of existing ISO’s and wanted to achieve the business continuity one. Unfortunately there are a lot about.

article thumbnail

When is an ISO not an ISO?

Plan B Consulting

This week PlanB Consulting are celebrating passing part 2 of our audit and being certified to ISO 9001. With an ISO, you are regularly audited and it keeps you honest. They had a number of existing ISO’s and wanted to achieve the business continuity one. Unfortunately there are a lot about.

article thumbnail

The 7 Best Data Protection Officer Certifications Online for 2023

Solutions Review

Data protection is a broad field encompassing backup and disaster recovery, data storage, business continuity, cybersecurity, endpoint management, data privacy, and data loss prevention. Data protection software becomes more crucial as the amount of data an enterprise creates and stores continues to grow at ever-increasing rates.

article thumbnail

7 mistakes that ISO 27001 auditors make

IT Governance BC

A good auditor will use the checklist as a summary at the beginning or end of their audit, with a more detailed assessment in their report, or they’ll use a non-binary system that doesn’t restrict them to stating that a requirement either has or hasn’t been met. They allow cost-cutting to starve the audit. Good auditing practices.

Audit 64