December 14, 2022
As 2022 comes to a close our December newsletter is a brief recap of the last 12 months. Having migrated the vast majority of our customers to the Essentials and Premium versions of IT Policy Management as a Service we received a lot of positive feedback, especially on the new functionality to help drive and increase user engagement with the policy content.
November 10, 2022
The release of a new version of the 27002 standard by ISO has introduced a number of changes from its predecessor, the 2013 version, as covered in our August and September newsletters. On 16th November, Protocol Policy Systems will make a new mapping option for the ISO27002:2022 version available to existing and new customers of Policy Management as a Service (PMaaS).
October 05, 2022
Having clear, consistent and risk-appropriate policies in place to manage data security can help you comply with your legal obligations and create positive, organisation-wide change. Most people tasked with data protection responsibilities will already be familiar with the Accountability Framework as a guide to safeguarding customer data. The Information Commissioner’s Office, which drafted the framework, states that ‘accountability is one of the key principles in data protection law...
September 07, 2022
Our August newsletter outlined the changes delivered in the new 2022 version of ISO 27002. In terms of the recommended controls the overall count in the 2022 revision has 21 less controls than before and 24 of the original controls have been merged. However, 11 new controls have also been introduced, let’s take a brief look at those new controls.
August 03, 2022
Nine years on from the last revision, there’s a new version of information security standard ISO 27002. What’s changed, and what does it mean for your company?
ISO 27002 is an internationally recognised security standard that sets out security controls to be used in implementing and maintaining an information security management system (ISMS). This is a system for safeguarding all of your company’s valuable information assets – from IT and digital material to
July 12, 2022
It’s common knowledge that a company’s most valuable asset is its people, yet information assets are a very close second. An organisation’s IP and data are mission critical, continually developed and improved by existing and new staff. So in the current environment of talent mobility, how does an organisation maintain its data integrity as well as its competitive advantage?
June 15, 2022
A positive and effective cyber security strategy requires easy-to-understand policies, a company-wide culture of adopting best practice, and a programme of ongoing training. Cyber security threats are an insidious problem, and countering them requires a collective approach, implemented at every level. Cyber security policies and training should be simple, relevant, consistent and workable; teams therefore need frequent reminders and refreshers to stay vigilant.
May 18, 2022
IT policies are a vital part of the foundation of your business, they help you manage cybersecurity risk and in turn minimise business, financial and reputational damage. However, they can be quite tricky to write. Building a set of IT policies that encompass everything your business requires, while keeping things understandable, can be a big challenge.
PROTOCOL POLICY SYSTEMS
Fill in the form or call us on (UK) +44 845 241 0099 or (NZ) +64 9 570 2233