BIGGETS DATA BREACHES OF 2024 (so far)

Security Breach

BIGGETS DATA BREACHES OF 2024 (so far) Why should you care about Information Security? Based on Kim Komando’s most recent broadcast. From big banks to car dealerships, 2024 has been a banner year for data breaches. Yes, I mean that in the worst way possible. I’d be shocked if there’s any person left unexposed at […]

The Human Threat to Information Security

Components of IS

The human factor is a significant aspect of information security threats. Research consistently shows that a substantial portion of security incidents can be attributed to human actions, either intentional or unintentional. Here are some key insights: Human Error: Studies often suggest that human error is a leading cause of security breaches. For instance, a 2023 report […]

Cyber Crime & Information Security in Latin America – Statistics & Facts

Ciber in LA

The technological development of the last decades has been marked by the rapid and growing adoption of the internet. However, this hyperconnectivity has made the common user, as well as governments and companies, a new target for criminal activity. Protecting networks, systems and data from cyber-attacks has thus become a must for anyone connecting to the […]

Example of a Program to Ensure ISMS Achieves Its Outcomes – ISMS V2022 Series

Cyber threat image

Example of a Program to Ensure ISMS Achieves Its Outcomes 1. Program Overview Objective: To ensure that the Information Security Management System (ISMS) achieves its desired outcomes, and that requirements and objectives are effectively developed, implemented, and monitored. Scope: This program applies to all ISMS-related activities within the organization, covering all departments and stakeholders involved […]

Documented Evidence – ISMS V2022 Series

Cyber threat image

Documented evidence is crucial in demonstrating that processes within an Information Security Management System (ISMS) have been carried out as planned. For ISO 27001: 2022 compliance, the following types of documented evidence can be used: 1. Policies and Procedures Information Security Policy Document detailing the organization’s commitment to information security. Procedure Documents Detailed step-by-step instructions […]

Verifying the Changes are Planned and Controlled – ISMS V2022 Series

Cyber threat image

Verify that changes are planned and controlled, and that unintended changes are reviewed to mitigate any adverse results, you can implement a robust Change Management process. This process should include specific steps, roles, responsibilities, and tools to ensure that all changes are handled properly. Here’s a detailed approach to verifying effective change management: 1. Change […]

Information Security for Outsourced Processes – ISMS V2022 Series

Cyber threat image

Verify that outsourced processes have been determined and controlled. This is crucial for ensuring that the Information Security Management System (ISMS) remains effective and compliant with ISO 27001: 2022 standards. Here are the steps and methods to verify that outsourced processes are properly identified and controlled: 1. Identification of Outsourced Processes A. Documentation of Outsourced […]

When to perform a Risk Assessment – ISMS V2022 Series

Cyber threat image

Follow the next steps and verification methods, to validate that information risk assessments are performed at planned intervals or when significant changes occur, and that documented information is appropriately retained: 1. Establish Risk Assessment Procedures A. Documented Risk Assessment Procedures Actions: ·        Develop detailed procedures outlining how risk assessments are conducted. ·        Specify the frequency of assessments […]

The ISMS Performance & Effectiveness – ISMS V2022 Series

Cyber threat image

Evaluating the information security performance and the effectiveness of an Information Security Management System (ISMS) involves several steps and methodologies. Here are key areas to focus on: 1. Defining Metrics and KPIs ·        Key Performance Indicators (KPIs): Define KPIs relevant to your organization. These could include incident response times, number of security incidents, number of vulnerabilities […]