Quantcast
Channel: Lewis Morgan – Vigilant Software Blog
Browsing all 15 articles
Browse latest View live

What to expect from Stage 1 and Stage 2 ISO 27001 audits

First-timers to the world of management standards and certification will, without a doubt, find the audit a daunting prospect. Even those with experience implementing management systems will often find...

View Article


Image may be NSFW.
Clik here to view.

New infographic shows how to conduct an effective information security risk...

Ely, England, 27 July 2014 – Vigilant Software, the leader in compliance software, has released a new infographic that explains how to conduct an effective information security risk assessment....

View Article


Vigilant Software launches new ISO 27001 Documentation Toolkit feature for...

Ely, England, 4 August 2015 – Vigilant Software, the leader in information security compliance software, has launched a new feature that enables customers to purchase vsRisk™ with a built-in...

View Article

BYOD: One in ten employees care about your data

A survey by Kaspersky Labs indicates that only one in ten employees are serious about keeping work information safe on their personal devices. Given that almost half of respondents indicated that they...

View Article

Make it easy for your employees to ‘do the right thing’

Despite the welcome announcement earlier this month that Dropbox has introduced two-factor authentication for users to apply a second layer of security to protect their files, this feature is a...

View Article


Record Cloud adoption rates prompt call for more vigilant employees

Skyhigh Networks has released findings of its European Cloud Adoption and Risk Report Q2, which shows that although 82% of UK-based IT decision-makers make use of Cloud services, a lack of security...

View Article

Image may be NSFW.
Clik here to view.

As cyber risks evolve, a mature cyber risk management approach is needed

Not long ago, cyber security wasn’t even a discussion point at most board meetings. As criminal hackers continue to employ a variety of techniques to infiltrate companies, cyber risk has become one of...

View Article

How do you comply with UK laws and assign the relevant ISO 27001 controls?...

Companies implementing ISO 27001 will find that carrying out a risk assessment is quite often a complicated and lengthy process. Before embarking on a risk assessment, it is necessary to establish the...

View Article


Information security managers tell us their biggest risk assessment...

Most implementation plans and activities for an ISO 27001 information security management system (ISMS) are based upon a risk assessment. Although experts agree that a risk assessment is at the core of...

View Article


Information security managers share their ISO 27001 risk assessment advice...

In the second part of this two-part series covering interviews with information security managers about their risk assessment experiences, we asked them what advice they would give to those just...

View Article

New video tutorial assists UK-based companies with information security and...

  Ely, England, 8 October 2015 – Vigilant Software, the leader in compliance software, has made available a new video tutorial to help illustrate the simplicity of meeting legal and regulatory...

View Article

Why our customers prefer vsRisk over spreadsheets for their risk assessments

Information security managers starting out with an ISO 27001 implementation often approach one of the most important – but certainly also one of the most challenging –aspects, the risk assessment, with...

View Article

New version of vsRisk features complete ISO 27001 risk assessment template

Ely, United Kingdom, 11 January 2016 – Leading compliance software developer Vigilant Software has released the latest version of its risk assessment software, which includes a complete risk assessment...

View Article


Image may be NSFW.
Clik here to view.

McAfee LinkedIn page hijack highlights the need to better understand risk

As organisations adapt to the evolving digital era, the number of entry points into their critical infrastructures rapidly increases. If organisations fail to understand the risks they face, they leave...

View Article

Image may be NSFW.
Clik here to view.

HBO treats risk to GoT scripts, enforces two-factor authentication

HBO’s Game of Thrones has never been far from drama when it comes to spoilers and plot details being leaked online. HBO has had to deal with drones flying over sets, rogue set photographers, and even...

View Article

Browsing all 15 articles
Browse latest View live