What would happen with the implementation of ISO 27001 without leadership and strategy? “What If” Series

Why ISO 27001? In the first place, because it is a practical recipe to implement an Information Security Management System that really helps your organization to safeguard your customers, employees and company’s information. But also, because it can be used as a guide to instill an information security & cybersecurity culture; the controls required by […]
IMPLEMENTATION GUIDE FOR ISO 27001: 2022 – ISMS V2022 SERIES
What if companies don’t gather and utilize the data and information generated by customers? “WHAT IF” Series

Basically, they will not be able to make informed decisions, improve products, and enhance customer experiences. They will not be able to retain nor to attract new customers, in consequence; will not grow and will not be able to build Sustainable Business Success. Customers are indeed generators of both data and information. Here’s how they […]
What if companies are not able to identify and use the information from customers that is most important for the business? “WHAT IF” Series

The importance of information from customers can vary depending on the nature of the business and its goals. However, some key types of customer information are universally valuable: 1. Customer Feedback: • Reviews and Ratings: Provides direct insights into customer satisfaction, product quality, and areas for improvement. • Surveys and Questionnaires: Helps gather detailed opinions and suggestions […]
What if a company wouldn’t have information? “WHAT IF” Series

Running a company without information is virtually impossible. Information is the backbone of every aspect of a business. Here are some reasons why: Strategic Planning: Without information, it’s impossible to set goals, plan strategies, or measure progress. Customer Insights: Understanding customer needs and preferences requires data and feedback. Financial Management: Accurate financial information is essential […]
What if a company does not have reliable information? “WHAT IF” Series

Ensuring reliable information is crucial for any company’s success. Here are some strategies companies can use: Data Quality Management: Implement processes to regularly clean and validate data to ensure accuracy and consistency. Reliable Sources: Use reputable and verified sources for information, whether it’s market research, customer data, or financial reports. Technology and Tools: Invest in […]
What if companies WANT but DON’T KNOW how to secure their information? “WHAT IF” Series

By adopting ISO 27001: 2022, companies can significantly strengthen their information security posture and reduce the risk of data breaches. Getting ISO 27001 certified involves several key steps. Here’s a general outline of the process: Gain Management Support: Secure commitment from top management to ensure the necessary resources and support for the certification process. Define […]
Risk Treatment Plan Compliance and Effectiveness

Verifying that the information security risk treatment plan has been implemented, documented, and that information is retained involves several key steps and verification methods. Follow this structured approach to ensure compliance and effectiveness: 1. Implementation of Risk Treatment Plan A. Plan Execution and Implementation Actions: · Ensure that the risk treatment plan (RTP) is implemented according […]
Audit Results – ISMS V2022 Series

Ensuring that audit results are reported to management and that documented information about the audit program and audit results is retained requires a systematic approach that includes clear communication channels, defined responsibilities, and robust documentation practices. Here’s a step-by-step guide: 1. Establish Clear Reporting Procedures Audit Reporting Protocol: Develop and document a standardized audit reporting protocol […]
Non-Conformities & Corrective Actions – ISMS V2022 Series

To ensure that non-conformities identified during audits are subject to corrective action, a robust and well-documented corrective action process must be in place. Here’s a comprehensive approach to achieve this: 1. Establish a Corrective Action Process Procedure Documentation: Develop and document a corrective action procedure that outlines the steps to be taken when non-conformities are identified. […]