Blog iso27001

ISO 27001 controls for security and business continuity
Disruptions in IT and business operations are not a question of “if” but “when”, as shown last year during the CrowdStrike massive outage. Disruptions include infrastructure failure, cyberattacks such as ransomware, even natural disasters but, more often, human error. For these reasons, the ISO 27001 2022 standard includes two important controls related to information security…
Pavlo Burda
ISO27002 explained, part 2
This article describes the set of controls from ISO 27001:2013. There is a new version of the standard, ISO 27001:2022 with a new set of controls. Please check the following articles to learn about these controls: A5 organisational controls A6 people controls A7 physical controls A8 technological controls The article is part two of…
Joost Krapels
ISO27002 explained, part 3
This article describes the set of controls from ISO 27001:2013. There is a new version of the standard, ISO 27001:2022 with a new set of controls. Please check the following articles to learn about these controls: A5 organisational controls A6 people controls A7 physical controls A8 technological controles The article is part three of a…
Joost Krapels
ISO27002 explained, part 4
This article describes the set of controls from ISO 27001:2013. There is a new version of the standard, ISO 27001:2022 with a new set of controls. Please check the following articles to learn about these controls: A5 organisational controls A6 people controls A7 physical controls A8 technological controls The article is part four of a…
Joost Krapels
Four password policy rules that lead to better cyber security
A good password policy is one of the simplest and most important security measures one can take. In this article we describe the four rules that any company should include in their security policy, especially if they want to comply to the ISO 27001 standard.
Sieuwert van Otterloo