dcsimg

July book of the month: A bumper ISO 27001 edition

Every month, IT Governance selects a book of the month from our extensive catalogue of cyber security guides, but this month we’ve been decided that one book just wasn’t enough. That’s why we’ve picked The ISO 27001 Expertise Bundle, which comprises four invaluable guides to help you understand and implement the information security standard.  Here’s an overview of each book and why you … [Read more...]

Is your organisation prepared for a cyber attack

Cyber attacks are increasing in volume and sophistication, and the financial and reputational damage to an organisation caused by an ineffectual information security posture can be fatal. Implementing an ISO 27001-certified ISMS (information security management system) can help to protect your organisation against such threats and demonstrates that you have taken the necessary steps to protect … [Read more...]

5 ways to become a successful distance learning student

Distance learning has opened doors for people who want to gain new skills but for whatever reason are unable to take traditional, classroom-based courses. However, we understand that the idea of studying by yourself can seem like a daunting, and perhaps even an isolating, experience. But there’s much less to fear than you might think. There are a lot of similarities to classroom-based learning – … [Read more...]

5 practical tips for planning ISO 27001 internal audits

Control A15.2 of ISO 27001 requires that, as part of an information security management system (ISMS), “managers within an organisation ensure that security policies are followed”. This sounds very sensible – but how do you know that managers are actually enforcing your ISMS security policies? The answer is regular ISMS internal audits, and it usually falls to the information security manager or … [Read more...]

Infographic: 5 benefits of distance learning

This month, IT Governance Europe launched its ISO27001 Certified ISMS Foundation (Distance Learning) training course. This modular recording of our popular one-day classroom course, which is delivered in Cork and Dublin, is the ideal starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. It provides a … [Read more...]

Why you should adopt ISO 27001

With cyber attacks and data breaches on the rise, cyber security is fast becoming organisations’ top priority. Many have chosen to mitigate the risk by implementing an information security management system (ISMS). An ISMS is a system of processes, documents, technology and people that helps organisations manage, monitor and improve their information security in one place. ISO 27001 is the … [Read more...]

Why ISO 27001 is integral to data protection compliance

With the EU General Data Protection Regulation (GDPR) compliance deadline on the horizon, any organisation that processes EU residents’ personal data will likely be exploring implementation options to help tackle its compliance project, if it hasn’t already done so. Supervisory authorities such as Ireland’s Data Protection Commissioner (DPC) have highlighted ISO 27001, the international standard … [Read more...]

Cyber security must become a key priority to maintain ‘integrity and confidentiality’ ahead of the GDPR

In her annual report, Helen Dixon, the Irish Data Protection Commissioner, stated that “Cybersecurity must now be a key priority for all organisations to maintain ‘integrity and confidentiality’ – particularly as this is one of the two new general principles of data protection introduced under the [General Data Protection Regulation (GDPR)] and against which the higher level of fines under [the] … [Read more...]

Ireland warned it is extremely vulnerable to cyber attacks

The National Cyber Security Centre (NCSC), which oversees Ireland’s cyber security, issued a warning last week that some government websites were being used to illegally mine cryptocurrency. The NCSC said that it “is aware that a number of websites using software from a third-party vendor is causing visitors to those sites to mine cryptocurrency without their express permission”. It is understood … [Read more...]

How can you validate a vendor that claims to be ISO 27001 certified?

As the number of cyber attacks continues to grow, many companies are adding ISO 27001 certification as a requirement on their supplier set-up forms. This is a good idea, especially as the forthcoming General Data Protection Regulation (GDPR) focuses on vendor management. If a vendor has an ISO 27001-compliant information security management system (ISMS) in place, this provides concrete evidence … [Read more...]