News & Blog Post

Author: inavate

Gap assessment conducted in office
Gap Analysis

Enhancing Information Security: The Importance of Conducting a Gap Assessment

ISO 27001 certification serves as a mark of approval for Information Security Management Systems (ISMS). This certification offers businesses a competitive edge, reassures clients that their data is secure, and signals a commitment to upholding industry standards. However, obtaining this certification can be a challenge, especially for businesses that are new to the process. One

Continue Reading •••
Office interior internal auditing
Continual Improvement

Understanding the Benefits of a Tailored Internal Audit for your Information Security Management System

You’ve just passed your stage two certification audit, everyone celebrates, your stakeholders are happy, and you take a huge sigh of relief that it’s all over. Yet the journey doesn’t quite end there. Before you know it, your surveillance audit is just around the corner and you are meticulously preparing to demonstrate compliance and showcase

Continue Reading •••
ISO 27001

Changes to ISO 27001 – What You Need to Know

With the recent revisions of the ISO 27001 standard, it’s important for firms to understand the key changes and next steps to ensure transition to adhering to the standard. With over 20 years of experience as an ISO 27001 consultant and cyber security expert, Andy Brophy, Founder of Inavate Consulting, has led hundreds of independent audited

Continue Reading •••
Women in tech
Personal

Challenges Faced by Women in Tech

By Miral Laurie, Information Security Consultant Understanding the obstacles is the first step toward overcoming them. In the tech industry, these challenges are often deeply ingrained, necessitating a collective effort to dismantle. Gender Bias and Discrimination The gender pay gap remains a stark reality in tech. I vividly recall a moment when a male colleague,

Continue Reading •••
By Miral Laurie, Information Security Consultant
Personal

Empowering Women in Tech: Breaking the Glass Ceiling

By Miral Laurie, Information Security Consultant Miral here, proudly embracing my journey as a woman in the tech and cybersecurity realms. I’ve never been one to conform to labels, yet they’ve followed me throughout my life. From being labelled as ‘Hyper’ or ‘the why kid’ in my youth to earning the affectionate label of ‘Mad

Continue Reading •••
Cloud Security

Understanding ISO/IEC 27018: Protecting PII in a Public Cloud Environment

As businesses increasingly turn to the cloud for data storage and processing, protecting personal data has become a top priority. ISO/IEC 27018 is a standard designed to help cloud service providers protect personally identifiable information (PII) in a public cloud computing environment. If you’re a CTO looking to gain a deeper understanding of this standard

Continue Reading •••
Cloud Computing
Cloud Security

Understanding ISO 27017 and its importance in securing cloud computing environments

As more and more companies are adopting cloud computing to enhance their business operations, ensuring secure cloud environments has become a critical concern. The International Organisation for Standardisation (ISO) has created a set of standards that are specifically designed to establish and maintain information security controls in cloud computing environments. One such standard is ISO

Continue Reading •••
Business Continuity Management System
ISO 22301

ISO 22301: What is it and how it can benefit your business

Disasters can strike any company at any time, leading to devastating impacts to business operations. It is crucial for companies to have a robust Business Continuity Management System (BCMS) system in place to ensure quick recovery from disasters. But what exactly is business continuity management, and how can it benefit your business? This article explores

Continue Reading •••
AI
AI

The power of AI: Why incorporating acceptable use rules is essential

In today’s rapidly evolving technological landscape, Artificial Intelligence (AI) stands out as one of the most transformative innovations of our time. AI has permeated every aspect of our lives, from virtual assistants on our smartphones to autonomous vehicles and advanced medical diagnostics. While the potential of AI is awe-inspiring, it also brings about ethical and

Continue Reading •••
Cyber Security Awareness Month
Cloud Security

The key to digital security: Mastering Password Hygiene

In today’s digital age, ensuring the security of our online accounts and sensitive information is of paramount importance. Passwords are one of the first lines of defence against cyber threats, and yet, many people still use simplistic, easy-to-guess passwords and reuse them across multiple accounts. This can put individuals and their company at great risk.

Continue Reading •••

Sign up for Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit.