
3rd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

URM provides some top tips for achieving an effective and successful information security management system implementation

URM is sharing its experiences on how the changes to the PCI DSS v4 affect the assessment process and how organisations can best prepare for the differences.

After the recent changes to PCI DSS v4.0 we're examining factors behind the greater utilisation of MFA, and what the key changes are in requirements.

Following the publication of ISO/IEC 27001:2022 on 25 October 2022, this blog will provide you with our high-level analysis of the key changes.

Almost all organisations that implement the Payment Card Industry Data Security Standard (PCI DSS) struggle with the scope of the applicability....

In this blog, we address one of the big questions facing organisations which accept payment cards....

In recent blogs, we have focused on how best to ensure you comply with the PCI Data Security Standard....

While it’s one of the areas that IT and security departments find challenging, documentation (and compliant evidence)....

As a Payment Card Industry Qualified Security Assessor (PCI QSA) company, we are often asked by organisations which process card payments....

There’s no getting away from the fact that preparing for a PCI DSS ROC can be a bit of a trial....

In this blog, we turn our attention to service providers. The PCI Security Standards Council defines a service provider....

We are often asked, both by those new to PCI DSS and those who have been involved for a while....

For an organisation to achieve and maintain compliance to the Payment Card Industry Data Security Standard (PCI DSS)....

In this article, we aim to clarify what requirements the Payment Card Industry Data Security Standard (PCI DSS) places around....

In our previous blog, we looked at where your PCI compliance journey starts. The first step is understanding the flow of your payment card data....

Often referred to as the PCI DSS or quite simply PCI, the Standard was developed by the founding payment brands....

The Payment Card Industry Security Standards Council (PCI SSC) defines scoping as “the process of identifying all system components....

PCI remediation is an essential activity for any organisation wishing to fully comply.....

URM’s PCI DSS gap analysis service is aimed at those organisations which are looking to benchmark....

Many organisations have had to adapt very quickly to the rapidly changing restrictions brought in across the globe to help combat the spread of COVID-19.

We are going to explore why the focus on a risk-based approach has helped turn ISO 27001, the International ISM Standard, into such a world-beater.

One of the long-held beliefs underpinning many a password policy is that forcing a regular password change is a good thing.

There is some confusion about the difference between having an ISMS which is certified to ISO 27001 and one which is compliant or aligned to the Standard.

With this blog, the spotlight turns to internal audit and specifically in the context of ISO 27001, the International Standard for ISM.

With the news often including stories regarding high-profile information security breaches, many of us find ourselves asking how we can avoid it.

This blog takes a look at onboarding information systems. When onboarding is mentioned will conclude it’s referring to people but there is a lot more to think

This blog talks about information classification. So, what exactly do we mean by information classification?

In this blog, we are going to look at governance. We are regularly asked, ‘is information governance the same as IT governance?’

When managing the security of your organisation’s information assets, you will need to consider the scope of what you are doing.

The answer depends on your goals and knowledge of your current position. This blog will look at which is best and when.

Broadly speaking, information security is held up by three pillars – People, Process and Technology. It is widely accepted that humans are the weakest link

The purpose of ISO 27002 is to provide organisations with guidance on selecting, implementing and managing information security controls.

Annex A of ISO 27001 comprises 114 controls which are grouped into the following 14 control categories.

As with all ISO standards, it has been developed by a panel of experts and provides a specification for the development of a ‘best practice" ISMS

Executing your decision to use an information security management system (ISMS) to manage the security of your information assets is a project. It is not.

In this blog, we aim to provide 10 top tips to enable you to keep important information assets safe and secure whilst working remotely.

There are many good reasons to implement an information security management system (ISMS) and get it certified to ISO 27001.

In this blog, we’re going back to basics and looking at some of the fundamentals of information security and ISO 27001.

In this blog, we’ll take a look at management commitment, one of the most significant.

Due to the increased use of technologies and the ‘human’ involvement, it is inevitable we are all going to face more and more information security incidents.

Typically, this question is twofold; which assets to include and the depth or granularity. In this blog, we will look at granularity.

URM assisted over 350 organisations achieve ISO 27001 certification, here are the critical steps when implementing an effective information security system.

A key role of risk management is helping organisations decide how limited resources can be most effectively used to address the most pressing business issues.

In order to meet the requirements of ‘Asset management’ A.8 from Annex A of ISO 27001, it is necessary to identify organisational assets and define protection

‘How do we approach asset identification within our information security risk assessment?’. This blog examines which assets or asset types to include.

In this blog, we want to dig a bit deeper into the benefits that are gained from implementing the Standard and from achieving certification...

ISO 27001 is a standard for Information Security Management that provides any organisation with a framework to protect most valuable assets.

We address a number of key questions: What are the Main Contents? What Led to it Being Published? And others.

After several years wait, and to surprisingly little fanfare, the PCI SSC released the new version of the PCI Data Security Standard (DSS).

ISO 27001 is the International Standard for Information Security Management. It provides organisation with a framework and an approach to protecting assets

What are the Benefits of Implementing ISO 27001? We dig a bit deeper on the benefits that are gained from implementing the standard.

A question which comes up time and time again is ‘How do I approach asset identification within my information security risk assessment’.
If you want to learn more about ISO 27002:2022 and how to implement the new controls and the new attributes, you can attend URM’s ISO 27001:2022 Control Migration Course.
URM can help you get ISO 27001 certification
Having been involved in over 350 successful ISO 27001 certifications, URM is ideally placed to advise you on the essential activities and tasks you will need to carry out in order to maintain and improve your ISO 27001 auditing function and programme