We come across this question quite often, so here is an attempt to demystify it.The annexure Section 8 of ISO 27001 provides technological controls, settings, policies and practices.

Know More

Would you like anyone to collect, store or process your personal data without your consent? I am sure your answer is ‘NO’!

Know More

Have you ever been in a situation that requires reading and interpreting a SOC 2 report? A SOC 2 report reveals quite a lot of information about security controls including people, processes and technology implemented in the service organization.

Know More

Implementing HITRUST requirements can be a complex process, given its comprehensive requirements for protecting patient health information. 

 

Know More

A comprehensive General Data Protection Regulation (GDPR) implementation involves a thorough and structured approach to ensuring compliance with the GDPR requirements.

Know More

ISO 27001/ISO 27002 implementation and certification journey can be divided into the following key phases:

Know More

A comprehensive SOC 2 (System and Organization Controls 2) implementation involves a comprehensive approach to ensuring that an organization's systems, processes, and controls meet the standards set forth by the American Institute of CPAs (AICPA).

Know More

Ever wondered what you need to know about being safe in cyber space? Here are the top 10.

Know More

Implementation of Information Security management System (ISMS) in line with ISO 27001: 2013 demonstrates management commitment to protect information assets,

Know More

Business Impact Analysis (BIA) is the act of identifying and prioritising an organization’s services (internal and external) that should be up and running in the event of disaster. 

Know More

Listed below are key steps for a comprehensive business continuity program

Know More

Business continuity is about your recovery of your business post crisis not before. Insurance does not recover business, it recovers losses or existing investment.

Know More