In order to provide further reassurance to your stakeholders, and customers in particular, you are also able to seek independent certification to ISO 27001. This is a process where, following an assessment of your ISMS by an accredited certification body, you are able to provide evidence that you meet the requirements of the standard.

Critical Cyber Security Practices to Defend Against Ransomware Attacks
URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.

URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard

A question which comes up time and time again is ‘How do I approach asset identification within my information security risk assessment’.