top of page
FORMS & PROCEDURES:
Blog
Search
Jodie Read
Feb 11, 20222 min read
#FindingsFriday: ISO 27001:2013 - Annex A.6.2.1 Mobile Device Policy
The Finding Laptops are encrypted. Policy ISP 11 should define encryption levels. Some Context to the Finding It is normal to use...
0 comments
Maria Williams
Nov 10, 20212 min read
Don't play War Games with your Cyber Security.
The War Operation Plan Response (WOPR) computer played out all the scenarios. The noughts, the crosses, always tying the games. Then, it...
0 comments
bottom of page