CALL US TODAY : (0)20 8798 9282

Blog

ISO 27001 encourages learning and improvement

ISO 27001 is in incredible demand these days. Certainly if you are an organisation that are active in the UK market, it has become almost a mandatory requirement to have an independently verified ISO 27001 Information Security Management System (ISMS) in place. Part...

read more

What are the key benefits of ISO 27001

So what are some of the benefits of ISO 27001? Truth be told, in most cases when a client is approaching us regarding ISO 27001, it is to get certified because the end customer is requesting ISO 27001 certification. There is absolutely nothing wrong with having that...

read more

ISO 27001 and Risk Management

ISO 27001 and risk management. I really like the fact, that ISO 27001 is based on risk assessment, and I guess I am not the only one, since the next version of ISO 9001 will also introduce risk management to replace preventive action, and...

read more

ISO 27001 Internal Audit

Part of running an effective ISO 27001 Information Security Management System (ISMS) is to run an effective internal audit programme. The purpose of the audit programme is make sure, that the ISMS conforms to your own requirements as well as...

read more

ISO 27001 Implementation Checklist

So you have decided to implement ISO 27001 (perhaps you read this blog), but how do you do it? Well here is our simple 20-step ISO 27001 implementation checklist. Leadership commitment. Yes, information security and ISO 27001...

read more

ISO 27001 on the Microsoft Partner Network

We have another guest blog on the Microsoft Partner Network. This one is about the cost of ISO 27001: https://blogs.technet.com/b/mpn_uk/archive/2014/06/19/guest-blog-what-does-iso-27001-certification-cost-and-what-does-it-cost-if-you-don-39-t.aspx

read more

ISO 27001 vs ISAE 3402

How does ISO 27001 vs ISAE 3402 look and is your customer asking you to have an ISAE 3402 report in place and how does that relate to ISO 27001? We sometimes help clients designing and implementing an information security system to be audited...

read more