Posts

Showing posts from August, 2022

Why risk based approach is a better defence?

Image
What is the best approach to address your organisation's information security issues? There are common as well as your business specific Information security threats and mitigation techniques to handle them.  For instance, you may already may have  staff  training, anti-malware and other technologies in place. However, you may not know how effective is your defences until meet a real threat. This requires every organisation to build their defence according to the potential information security risks they might face. So, what actually is a risk-based defence? Your organization does not have an unlimited budget for information security. This requires you to best use available resources carefully to build your defence. The best approach is to conduct a risk assessment, identify risks and  prioritize your risks. Then you can implement appropriate controls to mitigate your risks. ISO 27001 ISMS standard provides you a framework to follow a  risk-based approach to mee...

Why your organization need ISO 27001?

Image
ISO 27001 is the most comprehensive international standard  ISMS (Information Security Management System).  1. ISO 270001 based ISMS provides you a systematic approach that consist  processes, technology and people to help you for  effective risk management to protect your organisatin's information.  2. In a world of rising cyber crime ISO 27001 gives your organisation an independent, expert verification of your information security practices.  3. It helps you comply with the EU GDPR (General Data Protection Regulation)   4. ISO 27001 ensures legal and regulatory compliance for data protection. 5. It gives you a competitive advantage with defence measures for information security. 6. With ISO 27001 certification an organization gains trust of customers, suppliers and investors that their information is protected. individual , you are more  7. ISO 27001 improves your  information security posture with controls that protect your data ...

Why you need an ISMS?

Image
An ISMS (Information Security Management System) is a framework which help you manage yor your organisation’s information security. It enables you to assess, manage, monitor, review and improve your information security practices.  With an ISMS you will develop policies, procedures, guidelines and controls to meet three objectives of information security:  1. Confidentiality:  You will ensure that your data can only be accessed by authorized people.  2  Integrity: You will keep your data accurate and complete, where they will only be modified in an authorized manner only. 3. Availability:  You will make sure that your data can be accessed when it’s required. Further more an ISMS : Help you protect various forms of data including  intellectual property, data on cloud, company secrets, data on devices and hard copies and personal information. Reduce your cyber attack surface and increase your attack resilience Reduce your information security costs with ...

Cyber Security Awareness Free!

Image
How secure is your business against a data breach threat?  Would you like to plan a Cyber Security strategy to manage the risks to your data?  Get a free Consultation today.  WhatsApp 0718188096 your name, organisation to learn more on this offer. Click this link to sign up to join upcoming free awareness session. https://forms.gle/2uNUkzbXL1jM3Bot8 Shilpa Sayura FoundationN NextGen Skills Now! Loading…

What is Business Continuity Management?

Image
image : EC council Business Continuity Management (BCM) can be simply explained as planning to survive from disruptive incidents. Disasters struck when you least expect it. The cause of the disaster could be a natural or a human factor. Whatever the disaster your organisation need to be prepared. What are the types of disasters impact your information systems ? Data Breaches Hacking of Systems  Critical application failure  Employee sabotage Service provider outage  Power outages Communication outages Internet outage Fire, Floods etc. Natural Disasters  Ask your self : What areas of business will each of above disaster impact? What will be the liklyhood of it happening? What will be your loss?  How would you recover? How long the recovery will take? What would it cost? Although you may not have perfect answers, you need them.  BCM is a process that will help you identify potential threats, and their impact on your business operations. In the event of a dis...

ISO 27001 : A 10 Step Implementation Guide

Image
ISO 27001 is the most comprehensive international standard for the implementing Information Security Management System (ISMS) for any organisation.   It helps your organization to systematically maintain confidentiality, integrity and availability (CIA).  The key benefits are  1. Complying with an excellent framework to protect information assets from malicious actors. 2. Increase customers, partners, suppliers, investor and other stakeholder confidence and reputation. 3. Gaining an edge over its competitors.  The process of implementing an ISO 27001 ISMS is a challenging task. However, it's a worthy effort  in the long run to protect your information assets. This 10-step guide will help you complete  ISO 27001 journey successfully.  Step 1:Establish a Project Team. Jump start ISO 27001 by appointing a project leader with sound knowledge about your organisation, business operations and information security.  Provide adequate authority to the ...

2 minute guide to ISO 27001 - A preview

Image
Almost every business is connected to internet today, and rely on digital data and communications vital for their daily operations. Any form of information security breaches can severely effect their business continuity and revenues.  Security breaches are a growing threat like never before. You are responsible for your customers, suppliers, employees, investors and other stakeholders for their sensitive data. The regulations are also becoming more stringent with growing data breach incidents across the world. International Standard Organisation offers ISO 27001, a comprehensive and systematic framework of compliance to manage Information Security System in your organisation.  The  ISO 27001 certification aims to increase  confidentiality, integrity and availability to safeguard your sensitive  information and to reduce the risk of information security breaches.  The ISO 27001 framework 1. Help you identify information security risks across the business ope...

How easily the data breaches occur? 5 ways to be aware of.

Image
Data breaches can occur at any unexpected moment. Unless you do not detect it fast, cybercriminals will have more time to exfiltrate information and cause bigger damage. On average it takes up to 30 days and costs $1 million to address a data breach incident stated 2021 Cost of a Data Breach Study. However, it could be more if you wait longer. Unfortunately, some took 6 months to respond.      Better safe than be sorry! Be prepared against data breaches.  There are 5 ways for your organization to avoid data breaches. Here is how. 1. Weak and stolen credentials  The most simplest way hackers use for data breaches is stealing passwords. Many people use predictable passwords like ‘Password1’ and ‘123456’. With them, cybercriminals don't even need to hack into a system to steal your sensitive data.  There are many tools that can help a cybercriminal to crack passwords. They run millions of popular credentials to break into your system. This requires you to have...

How data loss can occur?

Image
image (forbes) Whether your business has 100 customers or 1,000,000 protecting your data from various risks is a priority. Because a data loss is lethal. A Data loss can change the course of your life.  When sensitive information is exposed individuals, businesses, government can face huge complications. In the connected world no one is safe from hackers. Their weapon could be SMS, Bluetooth, an email or a website that will use a small vulnerability  in your phone or laptop to do a lager damage to you and your organization.‌ Most people are unaware of how modern security threats work, because they do not give it enough attention to information security. So! What exactly is a data breach? A data breach exposes confidential, sensitive, or protected information to an unauthorized person without permission.  Data breaches happen due to weaknesses in technology and human actions weather intentional or not. We use many new digital devices with minimal security testing, and expo...

The Value of Information in Digital age

Image
Information is processed Data. They come from every functional area of an organization. Information and information systems is the lifeblood of business. They drive organizations into future by managing products, services, customers, employees, streamlining operations and increasing productivity. Information guarantees your organizations survival and business continuity. Imagine if one moment your organization looses it's information due to an event, which is accidental or maliciously planned or a natural disaster?   How do you answer to your shareholders, customers, suppliers, employees, authorities? How do you get your business back in operation, serve customers, generate revenue and pay your employees and suppliers?   It may not have happened yet. But do you have a guarantee that it will not happen today, tomorrow, next year or in five years.  GOOGLE+ In October 2018, Google+ was shut down due to a bug caused 500,000 profiles not to include passwords. Googl...

FREE ISO 27001 Foundations Course

Image
This beginner-level course from 27001 Academy will help beginners to understand implementation process of ISO 27001 standard. It includes six modules comprising video lectures, text notes, exercises, and a recap quiz. You can complete the whole course with in a week or two spending about 12-16 hours. This course helped to create good foundation in ISO 27001 framework, assessment process and documents required. Try it here! https://training.advisera.com/course/iso-27001-foundations-course/ Niranjan Meegammana 

Main Steps in ISO 27001 Risk Management Methodology

Image
https://adv source : advisera.com

What is ISO 27001 ISMS ? A Presentation

What is ISO 27001 ISMS from Business Beam

How My ISO 27001 Journey Began?

Image
Although I had an idea to develop my Cyber Security knowledge and skills for sometime, it only became a reality when i signed up for MSc in Cyber Security at Sri Lanka Institute of Information Technology in January 2022. One of the course modules that I am taking is Information Systems Security Management in semester two, requires completing an assignment, that develops me as an Information Security consultant mainly focused on ISO 27001 security framework.  ISO 270001 is the leading international standard of information security, published by International Standard Organization and IEC. It is focused on Protecting organization information in a, systematic and cost-effective way, through an Information Security Management System.  During next 3 months I will be studying and taking a Journey in implementation of ISO 27001 for small and medium organizations, and I will share foot steps of my learning, and my activities in this journal. Subscribe and learn ISO 27001 proce...