Browse our site

Search for.... iso 27001 (4)

Blog

Keeping Systems in Sync: Managing Time, Privileged Tools, and Software Installation in ISO 27001:2022 Controls A.8.17 – A.8.19

ISO 27001:2022 annex A controls A.8.17 – A.8.19 play a vital role in maintaining system integrity and security. Accurate timekeeping ensures reliable logs for audits and threat detection, while restricting privileged utilities and software installations minimises the risk of unauthorised changes and malware infections. This post explores best practices for implementing these controls to strengthe...
Blog

Protecting Your Business: Controls to Combat Known Cyber Threats

More details have emerged about the root causes of the large data breaches in 2022.  Here, we will assess the key technical aspects that lead to the breaches, and how controls from ISO 27001 Annex A and the Australian ISM can be put in place to prevent this. With ISO 27001 certification, the implementation of these controls and processes within the organisation can be independently monitored by a...
Blog

Staying on Track with Terms of Service Agreements with ISO 27001

How often do you read Terms of Service Agreements or Privacy Policies of websites that you use or create an account for? Mostly likely rarely, if ever. And in a business setting, how many employees are also rarely (or not at all) checking Terms of Service/Privacy Policies? What impact could this have on your business’s information, or worse yet, your clients’/customers’ information? This is where...
Blog

ISO 27001 People Controls: Implementing Key Information Security Practices from Hiring to Offboarding

In this week’s post, we cover all of the controls which the ISO 27001 standard has classified as “People Controls”. This will cover data security throughout the lifecycle of an employee or contractor’s engagement with your organisation from screening, through to offboarding and responsibilities after employment has ceased, including employment contracts and terms and conditions as well as confide...
Blog

Foundations of ISO 27001: Implementing Clause 4 for Information Security Success

When embarking on the journey to meet ISO 27001, clauses 4.1 through 4.4 provide a good starting point, where a strategic and well-planned approach is essential. These clauses, which encompass understanding the organisation and its context, identifying interested parties, determining the scope of the ISMS, and establishing the ISMS itself, form a cohesive basis. To successfully navigate this terr...
Blog

Experiences of aLIVE-Service GmbH with the ISMS standard

The DQS certification according to the ISMS standard ISO 27001 helps aLIVE-Service GmbH to optimally protect sensitive patient data and thus to stand out from the competition. Consistent adherence to the security requirements of ISO 27001 certification ensures that the full-service and IT provider for health insurance companies and companies in the healthcare market can process sensitive health d...
Blog

Developing and Releasing Secure Software with ISO 27001 Controls A.8.28–A.8.31

As digital systems become increasingly complex and interconnected, ensuring the integrity, resilience, and security of technical environments is more critical than ever. We continue our analysis of data security within the SDLC by looking at controls A.8.28 (Secure Coding), A.8.29 (Security testing in development and acceptance), A.8.30 (Outsourced development) and A.8.31 (Separation of developme...
Blog

Safeguard Your Information and Assets: Implementing ISO 27001 Controls A.5.9 to A.5.14

In this post, we delve into the management of information and other assets which store and have access to the information within your business.
Blog

ICT security for business continuity - control 5.30 in ISO 27001

Smoothly functioning information and communication technology (ICT) is essential for maintaining business processes in the context of digitalization. Even the shortest outages and disruptions are often accompanied by severe financial losses. Hackers exploit this potential for damage when they encrypt data and systems in sophisticated ransomware attacks and only release them after high ransoms hav...
Blog

Why ISO 27001 Is Critical for Hong Kong's Stablecoin Sector: Hidden Risks and Governance Gaps

As Hong Kong positions itself as a global hub for virtual assets, the rise of stablecoins is transforming the financial landscape. With over USD 1.5 billion raised by fintech startups in early 2025 and an increasingly favorable regulatory stance from the Hong Kong Monetary Authority (HKMA), the city is becoming a magnet for Web3 and blockchain finance. However, behind the boom lies a critical que...