ISO 27001: The Secure Standard for Implementing & Auditing Your ISMS

iso 27001 2013

The year is 2025. Over 465 exabytes of new data is generated each day. The global cybersecurity market is worth $241 billion. Your managed services provider is still using a process document dated March 2019, and you’re starting to regret not having gone with that ISO 27001 certified provider.

Hell, at this point you’re starting to think even an in-house ISMS (Information Security Management System) implementation would have been a better option.

But I’m getting ahead of myself; let’s return to the present. Is ISO 27001 all it’s cracked up to be? Whatever your stance on ISO, it’s undeniable that many companies see ISO 27001 as a badge of prestige, and using ISO 27001 to implement (and potentially certify) your ISMS may well be a good business decision for you.

In this article, we’ll take a look at the foremost standard for information security management – ISO 27001:2013, and investigate some best practices for implementing and auditing your own ISMS.

Here is a summary of what we’ll cover in this Process Street article:

If you just want the free checklist for implementing and auditing your ISMS, you can grab that here. Otherwise, read on!
Continue Reading

Enterprise Mobility Management (EMM): What It Is, Why It’s Important & How to Do It

Enterprise Mobility Management

The modern workforce is, quite literally, movers and shakers.

No matter if self-bought or company-bought, employees are using mobile devices to work from while in the office, going from meeting-to-meeting, traveling cross-country to attend conferences, and even when working from home.

But for some (read: the security-minded), this is a little worrisome. With employees using personal and portable devices for work purposes, security hazards are aplenty. Theft. Security breaches. Data loss.

I needn’t go on.

It’s why 75% of CIOs view mobile security for organizations as not only a headache but a significant problem.

Though, with modern problems come modern solutions.

In this super informative post, I’ll be discussing EMM: Enterprise mobility management. It’s what every organization needs to know about, incorporate, and sustain so that its business remains security breach-free. Just read through the following sections to get acquainted with all-things EMM:

Now, let’s stop dilly-dallying and get started!

Continue Reading

How to Create an Efficient Incident Response Plan (Including a 17-Step Checklist)

Benjamin Brandall
March 28, 2018
IT

Only 9% of information security professional believe their organization has effective incident response processes. The biggest issue? Well, you’re reading Process Street so you probably guessed it: the lack of standardization. Almost half of the respondents to the SANS Incident Response Survey said that their lack of a formal incident response procedure was holding them back and causing security issues.

It’s not even like preparing for serious security incidents is wasted time or that you’d be going overboard with precautions; 61% of companies have experienced critical incidents in the last two years — that includes data breaches, unauthorized access, and denial of service attacks.

Continue Reading

Get a free Process Street account
and take control of your workflows today.

No Credit Card Required