To give it its full title, ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements’ is an international standard which was published by the International Organisation for Standardisation (ISO). The purpose of the Standard is provide the requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS) within the context of your organisation. This is the Standard organisations can certify against.
The current version of the Standard replaced the 2013 version on 25 October 2022 and is applicable to all organisations, irrespective of type, size or sector.

Critical Cyber Security Practices to Defend Against Ransomware Attacks
URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.

URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard

A question which comes up time and time again is ‘How do I approach asset identification within my information security risk assessment’.