INFORMATION SECURITY
I
INFORMATION SECURITY SERVICES
Gap alnaysis
Our experts will conduct a security gap analysis. We determine whether your organisation’s current security performance is meeting expectations. (e.g. ISO 27001/27002, legislation, recommendations of regulatory bodies, etc.)
ISO 27001 implementation
Our consultants have the knowledge and experience to design and implement a successful ISO-compliant system.
Compliance
Our experienced experts can assist you in interpreting the requirements of laws, regulations.
Internal audits
Our consultants work with a number of certification bodies and conduct audits, so they have the expertise to carry out your internal audits.
System maintenance and support
Implementing ISO or other safety management systems is not a one-off exercise. Our experts can help you maintain your system or train your staff on an ongoing basis, even over the long term.
Conformity assessment
Not sure if your organisation is ready for a certification audit? Do you want to assess your organization or supplier against a requirement or guidance standard (ISO 27001, ISO 27017, ISO 27018, etc.)? Check out our Xpert-auditor service!
Why information security is important?
FACTS
[] Globally, 40% more organisations were attacked each week in 2021 than in 2020.
[] The number of ransomware attacks continues to rise, with a 93% increase year-on-year. Globally, 1 in every 61 organisations are affected by ransomware every week.
[] 94% of organizations allow remote access to corporate applications and devices from un-managed and managed devices, while 17% reported allowing remote access only from company-managed laptops.
[] Gartner predicts that by 2025, 99% of cloud security problems will be the result of human error in setting up devices and cloud security
Source from: blog.checkpoint.com
About the ISO 27001 standard
[] ISO/IEC 27001 is a widely recognized standard that specifies requirements for an Information Security Management System (ISMS).
[] There are more than a dozen standards in the ISO/IEC 27000 family. Using them enables organisations to ensure the security of assets such as financial information, intellectual property, employee data or information entrusted by third parties.