Upgrade Deadline is October 31st. 2025!

ISO image

ISO standards, including ISO 27001, are periodically reviewed and revised to ensure they remain relevant and effective in addressing current challenges, technological advancements, and industry best practices. Here are some key reasons why ISO 27001 is being updated to a new version in 2022. Moving from ISO 27001:2013 to ISO 27001:2022 involves a transition process […]

Is it difficult to get ISO 27001 certified if you are ISO 9001 certified?

Security and privacy

Obtaining ISO 27001 certification after already being ISO 9001 certified can be somewhat easier due to several factors: Management System Understanding: If your organization is already certified to ISO 9001, you likely have a well-established management system in place. This familiarity with management system requirements will make it easier to adapt and implement the additional requirements […]

How much time might it take to get ISO 27001 certification when you are ISO 9001 certified?

Time to implementation

On average, organizations that are already ISO 9001 certified and are aiming for ISO 27001 certification typically take between 6 to 12 months to achieve certification. This timeframe allows for the necessary steps to be completed, including gap analysis, implementation of required controls, internal audits, and preparation for the external certification audit. With the right […]

What do ISO 9001, 14001 and 27001 have in common?

ISO image

Believe it or not, more than what you think. And the good news is that if you have any of the 3 standards in place, you can easily upgrade to the others. With the right tools as the ones we have, success is guaranteed! ISO 9001, ISO 14001, and ISO 27001 are all international standards developed […]

Is there any value in getting ISO 27001 when you are ISO 9001 certified?

ISO 27001 when you are ISO 9001 certified

Yes, there is significant value in obtaining ISO 27001 certification, especially if your organization is already ISO 9001 certified. Here are several reasons why ISO 27001 certification can add value even when you already have ISO 9001 certification: Comprehensive Risk Management: ISO 27001 focuses specifically on information security management. It provides a systematic approach to identifying, […]

10 Tips & Best Practices for Cybersecurity

Best Practices for Cybersecurity (1)

Do’s and don’ts of cybersecurity These cycle of cybersecurity publications has ended, but we want to make sure we were able to help you to fight fraud and keep your information safe from the latest scams. •        Do ignore requests to make a person-to-person bank or credit card payments to yourself. Serious financial institutions will never […]

May it happen or not? Business Continuity is not only about Financials!

Business Continuity

Many people think that things like a cyber-attack or a natural catastrophe that can damage the business, is something with a very low probability of occurrence. Mainly if some measures have been already taken to prevent such situations. In a world where the future is uncertain and change comes fast, companies need to look beyond […]

Practical Security Wisdom for Daily Life – Security Minded. Cybersecurity 101.

Security Alert

Hackers have sophisticated tools that can easily defeat passwords based on dictionary words and common patterns. Under Lock & Key! Creating strong passwords offers greater security for minimal effort. You can buy a small padlock for less than a dollar; but you should not count on it to protect anything of value. A thief could […]

Three Keys to avoiding Phishing E-mails and Ransomware Attacks.

Phishing

Cyberattacks rely on human error. Whether a large-scale onslaught or a smaller, more targeted campaign, all successful phishing and email-based ransomware attacks are disruptive and damaging on some level. And the simple reality is that they rely on human error. For cyberattacks to succeed, someone, somewhere, needs to take the bait. Cybercriminals utilize social engineering […]

Multi-Factor Authentication: Why you should race to embrace it.

MFA

When you add layers of authentication, you add layers of security to your accounts, data, and systems. Authentication, in a security context, is about verifying your identity. And you authenticate on a regular basis: When you log into accounts and systems, the information you provide is intended to confirm your status as an authorized user. […]