ISO 27001 Archive
Part of our business is advising companies that wish to become ISO27001 certificated and we are delighted that two clients recently passed their independent audits with flying colours. Gemserv is an independent consultancy in the energy sector while Easynet is …
The recent report from the House of Lords Science and Technology select committee into ‘Personal internet security’ highlights the fact that businesses are not doing enough to protect their customers from the dangers of e-crime and on-line fraud. Clearly this …
Any organization based or operating in the United States needs to be prepared for possible lawsuits. Under the recently amended Federal Rules of Civil Procedure organizations face tough new requirements for preserving their electronically stored information, such as email and …
David Lacey has spelt out some of the real financial impact that business face when they suffer ‘data leakage’. In the case of TK Maxx he speculates that the cost could actually run into billions, rather than the mere $5m …
An entertaining interview with Bruce Schneier in IT Security. He sets out in typically forthright style his view on big questions such as ‘Is security a solvable problem?’ He says, “Organizations need to be liable if they expose our personal …
Businesses and organisations operating within the United States face particular challenges when it comes to regulatory demands. This is keenly felt in the area of information security, where it is necessary to satisfy a complex web of regulations. ISO 27001 …
Given the increasing desire of businesses to be certified to ISO27001, risk assessment has emerged as an important skill for the infosec professional. While it is well-established in other areas, risk assessment is new to many in technology and requires …
We’re pedalling fast to catch up following a very busy time in the run up to and aftermath of Infosecurity Europe in London recently. This was the first time we attended and we felt that things went well. We were …
A BBC TV programme, Inside Out, recently caused some red faces in the UK House of Commons by revealing that a six year-old girl was easily able to break into the parliamentary computer system by installing a keylogger on the …
Ian Kerr’s Computer Weekly article on the human dimension to infosecurity has good and bad points. He correctly highlights how critical it is to address employee behaviour within a security strategy – the smartest technological defences are of little help …