News & Blog Post

Author: inavate

information security
ISMS

Improve your ISMS for optimal performance

An Information Security Management System (ISMS) is an integrated set of processes and procedures that protect confidential data and sensitive information from unauthorised access, use, disclosure, destruction or modification. Having a well-designed and implemented ISMS can help your business achieve compliance with legal requirements and company policies while ensuring the security of sensitive data. This

Continue Reading •••
Data security in the cloud concept
Continual Improvement

The ever-evolving global cyber security landscape

We’re always interested to read the latest trends in particular from the Mandiant Cyber Security Forecast which sets out key areas of focus for the cyber security industry. As the global cyber security landscape shifts, it’s never been more important to stay one step ahead of cyber attackers. This Mandiant Forecast, as always, is available

Continue Reading •••
Cyber Security

Study finds firms struggle to secure sensitive data in the Cloud

The Cloud Security Alliance (CSA) has revealed findings of a survey – Understanding Cloud Data Security and Priorities – which sheds light on the data security trends in cloud computing. As the world embraces remote and hybrid working, many businesses rely on cloud platforms for data storage. The industry-wide survey suggests that companies are not

Continue Reading •••
Cyber security women maintaining ISMS
Cyber Security

Why acknowledging your cyber security weaknesses is a strength

It’s important to take a pragmatic and practical approach to risk in every area of our life, and corporate cyber security is no different. When working with a consultant to assess your firm’s cyber security, expect them to identify weakness, vulnerabilities, ways in, how to get data out and ultimately find out where you are

Continue Reading •••
Women in Security Google event
Cyber Security

Women in Security – Google Community Event: Key Takeaways

Our Information Security Consultant, Miral Laurie, had the privilege of attending the Google Cloud Women in Security Community Event at the famous Google headquarters in London. Here, Miral shares some of the key takeaways from this fantastic cybersecurity event! Check out Miral’s great account from the event below. “Yesterday’s women in security community event hosted

Continue Reading •••
27001 consulting
Internal Auditing

The Importance of employee training as part of internal auditing

As part of your ISMS, employee training and internal auditing are key components that should not be overlooked. Your people are the first line of defence against security threats, so it’s important that they know how to identify and report potential risks. By providing comprehensive training for both new and existing employees, your company can

Continue Reading •••
Continual Improvement

Is your Information Security Management System working for you? Or are you working for your ISMS?

An information security management system (ISMS) is a set of policies, processes, and procedures that help businesses protect their data. The goal is to ensure compliance with legal regulations and company policies while safeguarding sensitive information. If you already have an ISO 27001 certification, then you know how important it is to maintain a secure

Continue Reading •••
Computers with finance information
Gap Analysis

The Top 8 Mistakes Firms Make When Pursuing ISO 27001 Certification

The ISO 27001 standard is the international benchmark for information security management systems (ISMS). Achieving certification to this standard demonstrates that your company takes information security seriously and has implemented controls to mitigate risk. There are many companies now looking to obtain ISO 27001 certification for their ISMS. However, the process of obtaining certification can

Continue Reading •••

Sign up for Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit.