News & Blog Post

Author: inavate

Data security in the cloud concept
Continual Improvement

The ever-evolving global cyber security landscape

We’re always interested to read the latest trends in particular from the Mandiant Cyber Security Forecast which sets out key areas of focus for the cyber security industry. As the global cyber security landscape shifts, it’s never been more important to stay one step ahead of cyber attackers. This Mandiant Forecast, as always, is available

Continue Reading •••
Cyber Security

Study finds firms struggle to secure sensitive data in the Cloud

The Cloud Security Alliance (CSA) has revealed findings of a survey – Understanding Cloud Data Security and Priorities – which sheds light on the data security trends in cloud computing. As the world embraces remote and hybrid working, many businesses rely on cloud platforms for data storage. The industry-wide survey suggests that companies are not

Continue Reading •••
Cyber security women maintaining ISMS
Cyber Security

Why acknowledging your cyber security weaknesses is a strength

It’s important to take a pragmatic and practical approach to risk in every area of our life, and corporate cyber security is no different. When working with a consultant to assess your firm’s cyber security, expect them to identify weakness, vulnerabilities, ways in, how to get data out and ultimately find out where you are

Continue Reading •••
Women in Security Google event
Cyber Security

Women in Security – Google Community Event: Key Takeaways

Our Information Security Consultant, Miral Laurie, had the privilege of attending the Google Cloud Women in Security Community Event at the famous Google headquarters in London. Here, Miral shares some of the key takeaways from this fantastic cybersecurity event! Check out Miral’s great account from the event below. “Yesterday’s women in security community event hosted

Continue Reading •••
27001 consulting
Internal Auditing

The Importance of employee training as part of internal auditing

As part of your ISMS, employee training and internal auditing are key components that should not be overlooked. Your people are the first line of defence against security threats, so it’s important that they know how to identify and report potential risks. By providing comprehensive training for both new and existing employees, your company can

Continue Reading •••
Continual Improvement

Is your Information Security Management System working for you? Or are you working for your ISMS?

An information security management system (ISMS) is a set of policies, processes, and procedures that help businesses protect their data. The goal is to ensure compliance with legal regulations and company policies while safeguarding sensitive information. If you already have an ISO 27001 certification, then you know how important it is to maintain a secure

Continue Reading •••
Computers with finance information
Gap Analysis

The Top 8 Mistakes Firms Make When Pursuing ISO 27001 Certification

The ISO 27001 standard is the international benchmark for information security management systems (ISMS). Achieving certification to this standard demonstrates that your company takes information security seriously and has implemented controls to mitigate risk. There are many companies now looking to obtain ISO 27001 certification for their ISMS. However, the process of obtaining certification can

Continue Reading •••
Internal Auditing

The benefits of internal auditing

Once a firm has achieved ISO 27001 certification, it is important to maintain the Information Security Management System (ISMS) through continual improvement. This can be done by conducting regular audits and a review of information security management and strategy to ensure its effectiveness. It is important to monitor changes in the external environment that could

Continue Reading •••

Sign up for Newsletter

Lorem ipsum dolor sit amet, consectetur adipiscing elit.