News & Blog Post

Author: inavate

Why Multi-factor Authentication is important - Inavate Consulting
Cyber Security

Rise in Cyber Attacks – Why Multi-Factor Authentication is Crucial

In today’s digital age, cyber security awareness has never been more important. A recent article in Data Breach Today has highlighted just how crucial it is for customers to implement cybersecurity measures that protect business data from unauthorised access, manipulation, and theft. With this rise in cyber-attacks, IT professionals are constantly seeking ways to protect

Continue Reading •••
Internal Auditing Fintech
ISO 27001

The Internal Audit Advantage

ISO 27001 Internal Auditing Beyond the Checklist In an era where data breaches and cyber threats are becoming increasingly sophisticated, maintaining a robust Information Security Management System (ISMS) is more critical than ever. For those responsible for IT systems and Infrastructure Chief Technology Officers (CTOs) and Chief Information Officers (CIOs), the challenge extends beyond merely

Continue Reading •••
Gap assessment conducted in office
Gap Analysis

Enhancing Information Security: The Importance of Conducting a Gap Assessment

ISO 27001 certification serves as a mark of approval for Information Security Management Systems (ISMS). This certification offers businesses a competitive edge, reassures clients that their data is secure, and signals a commitment to upholding industry standards. However, obtaining this certification can be a challenge, especially for businesses that are new to the process. One

Continue Reading •••
Office interior internal auditing
Continual Improvement

Understanding the Benefits of a Tailored Internal Audit for your Information Security Management System

You’ve just passed your stage two certification audit, everyone celebrates, your stakeholders are happy, and you take a huge sigh of relief that it’s all over. Yet the journey doesn’t quite end there. Before you know it, your surveillance audit is just around the corner and you are meticulously preparing to demonstrate compliance and showcase

Continue Reading •••
ISO 27001

Changes to ISO 27001 – What You Need to Know

With the recent revisions of the ISO 27001 standard, it’s important for firms to understand the key changes and next steps to ensure transition to adhering to the standard. With over 20 years of experience as an ISO 27001 consultant and cyber security expert, Andy Brophy, Founder of Inavate Consulting, has led hundreds of independent audited

Continue Reading •••
Women in tech
Personal

Challenges Faced by Women in Tech

By Miral Laurie, Information Security Consultant Understanding the obstacles is the first step toward overcoming them. In the tech industry, these challenges are often deeply ingrained, necessitating a collective effort to dismantle. Gender Bias and Discrimination The gender pay gap remains a stark reality in tech. I vividly recall a moment when a male colleague,

Continue Reading •••
By Miral Laurie, Information Security Consultant
Personal

Empowering Women in Tech: Breaking the Glass Ceiling

By Miral Laurie, Information Security Consultant Miral here, proudly embracing my journey as a woman in the tech and cybersecurity realms. I’ve never been one to conform to labels, yet they’ve followed me throughout my life. From being labelled as ‘Hyper’ or ‘the why kid’ in my youth to earning the affectionate label of ‘Mad

Continue Reading •••
Cloud Security

Understanding ISO/IEC 27018: Protecting PII in a Public Cloud Environment

As businesses increasingly turn to the cloud for data storage and processing, protecting personal data has become a top priority. ISO/IEC 27018 is a standard designed to help cloud service providers protect personally identifiable information (PII) in a public cloud computing environment. If you’re a CTO looking to gain a deeper understanding of this standard

Continue Reading •••
Cloud Computing
Cloud Security

Understanding ISO 27017 and its importance in securing cloud computing environments

As more and more companies are adopting cloud computing to enhance their business operations, ensuring secure cloud environments has become a critical concern. The International Organisation for Standardisation (ISO) has created a set of standards that are specifically designed to establish and maintain information security controls in cloud computing environments. One such standard is ISO

Continue Reading •••
Business Continuity Management System
ISO 22301

ISO 22301: What is it and how it can benefit your business

Disasters can strike any company at any time, leading to devastating impacts to business operations. It is crucial for companies to have a robust Business Continuity Management System (BCMS) system in place to ensure quick recovery from disasters. But what exactly is business continuity management, and how can it benefit your business? This article explores

Continue Reading •••

Sign up for Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit.