Two fundamental pillars to achieve sustainable business success

CX-ISMS

Information security and customer experience are deeply intertwined. A strong security posture improves customer trust, meets expectations, and provides a seamless experience, while security breaches can lead to significant negative impacts on customer perception and loyalty. Companies that prioritize both can create a safer and more satisfying environment for their customers. Here’s a detailed exploration […]

What if a company does not have reliable information? “WHAT IF” Series

Information

Ensuring reliable information is crucial for any company’s success. Here are some strategies companies can use: Data Quality Management: Implement processes to regularly clean and validate data to ensure accuracy and consistency. Reliable Sources: Use reputable and verified sources for information, whether it’s market research, customer data, or financial reports. Technology and Tools: Invest in […]

What if companies WANT but DON’T KNOW how to secure their information? “WHAT IF” Series

Information security

By adopting ISO 27001: 2022, companies can significantly strengthen their information security posture and reduce the risk of data breaches. Getting ISO 27001 certified involves several key steps. Here’s a general outline of the process: Gain Management Support: Secure commitment from top management to ensure the necessary resources and support for the certification process. Define […]

October: A great month of the year that deserves our attention!

Business and customer

Three Great Events to be celebrated in October They are core components in the journey to Business Success! The CUSTOMER EXPERIENCE (CX) Day The reasons for choosing October as CX Month include: End-of-Year Planning: October is a strategic time for businesses to assess their customer experience strategies and make improvements before the holiday season, which […]

Audit Results – ISMS V2022 Series

Cyber threat image

Ensuring that audit results are reported to management and that documented information about the audit program and audit results is retained requires a systematic approach that includes clear communication channels, defined responsibilities, and robust documentation practices. Here’s a step-by-step guide: 1. Establish Clear Reporting Procedures Audit Reporting Protocol: Develop and document a standardized audit reporting protocol […]

Non-Conformities & Corrective Actions – ISMS V2022 Series

Cyber threat image

To ensure that non-conformities identified during audits are subject to corrective action, a robust and well-documented corrective action process must be in place. Here’s a comprehensive approach to achieve this: 1. Establish a Corrective Action Process Procedure Documentation: Develop and document a corrective action procedure that outlines the steps to be taken when non-conformities are identified. […]

Management Reviews – ISMS V2022 Series

Cyber threat image

Evidence that top management undertakes a review of the Information Security Management System (ISMS) at planned intervals can be demonstrated through various documented information and records. These documents should clearly show the involvement of top management in the review process, their evaluation of ISMS’s performance, and their decisions for improvement. Here are some key pieces […]

Outputs of the Management Review – ISMS V2022 Series

Cyber threat image

To know that the output from the ISMS management review identifies changes and improvements, you should look for specific elements within the documented results of the management review meetings. These elements should clearly indicate that top management has considered the current state of the ISMS, assessed its performance, and identified necessary changes and improvements. Here […]

The Management Review and Interested Parties – ISMS V2022 Series

Cyber threat image

To ensure that the results of the management review are documented, acted upon, and communicated to interested parties appropriately, follow these structured steps: 1. Documentation of Management Review Results Meeting Minutes and Reports Detailed Minutes: Record comprehensive minutes of management review meetings. Include participants, agenda, discussions, decisions made, and action items. Management Review Report: Prepare […]