top of page
FORMS & PROCEDURES:
Blog
Search
Jodie Read
Nov 1, 20222 min read
Information Assets for ISO 27001
If you're in the process of implementing an information management system to meet the requirements of ISO 27001 then one of your major...
0 comments
Maria Williams
May 10, 20223 min read
You don’t need I, Robot to prepare for a cyber attack – but Mango will keep your business running!
Sonny looked into Detective Del Spooner’s face. “No, Detective, I won’t deactivate. Dr Lanning created me for a reason, even though I...
0 comments
Jodie Read
Mar 18, 20222 min read
#FindingsFriday: ISO 27001:2013 - Annex A.15 Supplier Relationships
The Finding It may be beneficial to encourage [the shredding company] to gain a UKAS accredited ISO 27001 certificate, to further...
0 comments
Jodie Read
Feb 11, 20222 min read
#FindingsFriday: ISO 27001:2013 - Annex A.6.2.1 Mobile Device Policy
The Finding Laptops are encrypted. Policy ISP 11 should define encryption levels. Some Context to the Finding It is normal to use...
0 comments
Jodie Read
Dec 1, 20211 min read
Five gold stars for Space2B at The Maltings
As it's 1st December, you've kind of got to sing "five gold stars" as though you were singing the line "five gold rings" in the Christmas...
0 comments
Jodie Read
Nov 18, 20211 min read
ISO 27001 & ISO 22301 success for The Maltings Document Storage Solutions Ltd
The Maltings Document Storage Solutions Ltd (MDSS) specialises in the provision of document storage, scanning and destruction. They have...
0 comments
Maria Williams
Nov 17, 20212 min read
Is your business in danger of becoming a cyber security dinosaur like Jurassic Park?
John Hammond took the tour group to the main control room. “Everything is run from here, all the security is computerised, so everything...
0 comments
Maria Williams
Nov 10, 20212 min read
Don't play War Games with your Cyber Security.
The War Operation Plan Response (WOPR) computer played out all the scenarios. The noughts, the crosses, always tying the games. Then, it...
0 comments
Maria Williams
Nov 3, 20212 min read
Don't let the gang blow the doors off your information security this Cyber Monday!
Professor Peach leaned back on the bunk in his cell and started reminiscing. “It was 50 years ago now, of course, and so much has...
0 comments
Jodie Read
Aug 12, 20211 min read
How secure is your information?
Are you sure about that? Once upon a time in 2018 when there was heightened awareness of the need to implement data privacy and...
0 comments
ethandcoombes
Aug 10, 20212 min read
These ARE the standards you're looking for. . .
Obi Wan Kenobi pulled back his hood. “Hello, there,” he said, looking straight at the head Jawa standing in front of him. The Jawas said...
0 comments
ethandcoombes
Apr 6, 20212 min read
What are the three key pieces of legislation which govern the way we handle information?
Three years ago, one of the biggest changes to data protection legislation in our lifetime came into force in the UK. The General Data...
0 comments
Jodie Read
Nov 18, 20202 min read
Has your business mapped the equipment used by COVID-19 home workers?
Across the UK, thousands of organisations and businesses have employees working from home because of the COVID-19 pandemic. In our last...
0 comments
Jodie Read
Nov 11, 20202 min read
If your workplace is empty because of the Coronavirus, how secure is your information?
Thanks to the Coronavirus lockdowns, many workplaces have been left empty or barely used for months. In some parts of the UK, the...
0 comments
Jodie Read
Nov 4, 20202 min read
How has COVID-19 changed the way we deal with information security?
When the COVID-19 pandemic hit us, work changed radically. Companies had to make swift arrangements for employees to work at home or to...
0 comments
bottom of page