Posts by Chris Smith
The Benefits of an Information Security Management System (ISMS)
In today’s interconnected world, the protection of information is critical for organisations to maintain their competitive edge and stay ahead of the curve. ISO 27001 is an internationally recognized standard for information security management systems (ISMS). Implementing an ISMS in line with ISO 27001 offers numerous benefits to organisations. In this blog post, we will…
Read MoreCPNI Changes Name to National Protective Security Authority: NPSA
The Centre for the Protection of National Infrastructure (CPNI) is a UK government agency responsible for providing protective security advice to businesses and organisations that operate in critical national infrastructure sectors. The UK government announced that the CPNI would be renamed as the National Protective Security Authority (NPSA). In this blog, we will explore the…
Read MoreWhy Should You Adopt an ISO Management System?
In today’s competitive business environment, management systems have become essential tools for organisations of all sizes and types. These systems help businesses manage their operations more efficiently, reduce risks, and improve their overall performance. One of the most widely recognized management systems is the International Organization for Standardization (ISO) standards. In this blog, we will…
Read MoreWhat Is Information Security, and How Can ISO 27001 Help?
Information security refers to the protection of digital information from unauthorized access, use, disclosure, modification, or destruction. It encompasses various technologies, processes, and policies that are implemented to safeguard digital information and systems from potential threats and attacks. The primary objective of information security is to ensure the confidentiality, integrity, and availability of information, which…
Read MoreIs Compliance Enough for a Good Cyber Security Posture?
In today’s digital age, cyber security has become a critical concern for individuals, organisations, and governments alike. Cyber-attacks can lead to significant financial losses, reputation damage, and even national security threats. As a result, compliance with cyber security regulations has become a top priority for many organisations. However, compliance does not necessarily bring about cyber…
Read MoreInsider Threat – The Danger Within!
Jack Teixeira an IT specialist with the US Air Force has been arrested and accused of an intelligence leak believed to have started on Discord. He shared confidential papers on the social media platform including details regarding British Special Forces in Ukraine. This comes 10 years after the most notable leaks by Edward Snowden, a…
Read MoreRisky Business: A Guide to Information Security Risk Assessment
Risk assessment is an important process in information security that involves identifying potential risks and evaluating the likelihood and impact of those risks. The process involves identifying assets, evaluating threats, assessing vulnerabilities, and determining the potential impact of a successful attack. There are two main types of risk assessments: qualitative and quantitative. Qualitative risk assessments…
Read MorePasswords: The Gatekeepers of Your Digital Life
In the digital age, passwords are the keys to our online kingdoms. From email accounts to bank statements, social media profiles to streaming services, our lives are increasingly locked away behind these often-neglected digital gates. But what happens when these gates are weak, flimsy, or worse, left wide open? The Grim Reality of Weak Passwords…
Read More