article thumbnail

Managing Cyberthreats to Combat Ransomware Part 3: Cybersecurity Frameworks

Zerto

As we continue with our third and final blog in this series on managing cyberthreats, we’ll explore frameworks from the National Institute of Standards & Technology and Center for Internet Security, which together provide time-tested knowledge and best practices used to combat ransomware. The NIST Cybersecurity Framework 1.1

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

8 – Asset Management. Asset Management, Annex A.8 This section addresses how organizations define acceptable information protection obligations and identify information assets. Malware is addressed in Annex A.12.2, These are the control sets of Annex A : Annex A.5 7 – Human Resource Security.