Cyber threat image

Root Cause Analysis – ISMS V2022 Series

To ensure that the need for action to eliminate the root cause of non-conformities and prevent their recurrence has been evaluated, you should implement a systematic process that includes thorough analysis, action planning, and monitoring. Here’s a comprehensive approach: 1.

Read More »
Cyber threat image

Continuous Improvement – ISMS V2022 Series

To ensure that identified actions have been implemented, reviewed for effectiveness, and led to improvements in the ISMS, follow a structured approach that includes monitoring, verification, and continuous improvement. Here’s how you can systematically ensure this: 1. Implementation Tracking Action

Read More »
Security Breach

BIGGETS DATA BREACHES OF 2024 (so far)

BIGGETS DATA BREACHES OF 2024 (so far) Why should you care about Information Security? Based on Kim Komando’s most recent broadcast. From big banks to car dealerships, 2024 has been a banner year for data breaches. Yes, I mean that

Read More »
Components of IS

The Human Threat to Information Security

The human factor is a significant aspect of information security threats. Research consistently shows that a substantial portion of security incidents can be attributed to human actions, either intentional or unintentional. Here are some key insights: Human Error: Studies often suggest

Read More »