What is ISO 27001?

To give it its full title, ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements’...

Read more

What is the purpose of ISO 27001?

ISO 27001 provides a standardised approach that outlines how to manage information...

Read more

How does ISO 27001 work?

ISO 27001 advocates the use of an Information Security Management System (an ISMS for short), which is...

Read more

Why does ISO 27001 matter?

There are many ways your organisation can be impacted by a failure to protect your information...

Read more

When was ISO 27001 updated?

The current version of the Standard, ISO/IEC 27001:2022 replaced the 2013...

Read more

What changes were made with ISO/IEC 27001:2022?

The major change to ISO 27001, with the publication of the 2022 version, was the incorporation...

Read more

How to get ISO 27001 certification?

In order to provide further reassurance to your stakeholders, and customers in particular...

Read more

How long does it take to implement ISO 27001?

There is no straightforward answer to this question as it depends on the size and complexity...

Read more

Is there a legal requirement to comply with or be certified to ISO 27001?

There is, generally, no direct legal requirement as such.  Organisations choose...

Read more

What are the 7 mandatory clauses of ISO 27001?

The 7 mandatory clauses which you are required to comply with are clauses...

Read more

What is the difference between ISO 27001 and ISO 27002?

ISO 27002 is a supporting document that provides guidance on 93 best practice information...

Read more

Can I use Annex A as an information security controls checklist?

Many organisations use the controls listed in Annex A as a menu or checklist of best...

Read more

Why work with URM?

  • We have helped over 400 organisations to becomecertified to ISO 27001 across a range of sizes and industry sectors
  • 100% certification guarantee

We could quote our experience – all our consultants have at least 5 years of experience of implementing and managing ISMS’ which has enabled them to truly understand the challenges before becoming consultants.  

However, whilst all of these things are important, we believe it is our approach and our passion that really sets us apart.

For URM, it is vitally important that your ISMS and ISO 27001 implementation reflects and is appropriate to your organisation.  Your ISMS needs to be pragmatic and maximises everything you have in place and becomes business as usual.  

Doing something simply because the Standard says so and producing a document to reflect that, will never become fully embedded in your organisation.

Added to our approach and passion is our flexibility.  

We will help you in the way that suits you best – whether that is through providing advice and guidance, taking responsibility for some of the requirements such as risk assessment and policy production or providing you with an experienced individual for a period of time.

Stay in the loop

Please provide your contact details and we will email you with any future changes to ISO 27001 (and the implications!).

Critical Cyber Security Practices to Defend Against Ransomware Attacks

Published on
14 Aug
2025

URM’s blog examines how ransomware occur, and highlights practical cyber security measures you can implement to reduce your exposure and mitigate security risk.

Read more
Thumbnail of the Blog Illustration
Information Security
published on
8/8/2025
ISO 27001: How Certification Works

URM’s blog breaks down the ISO 27001 certification process, the roles of certification bodies and UKAS, what auditors look for during assessments, and more.

Read more
Thumbnail of the Blog Illustration
Information Security
published on
7/8/2025
ISO 27001:2022 - A.5 Organisational Controls (Business Continuity)

URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard

Read more
Thumbnail of the Blog Illustration
Information Security
published on
25/7/2025
Streamlining Asset Identification For Effective Risk Management

A question which comes up time and time again is ‘How do I approach asset identification within my information security risk assessment’.

Read more
"
We’d like to thank our assessor for his usual thorough and fully detailed attention to our system. Our ISMS is being spoken about in much awe and reverence within the wider organisation and I can honestly say that, without his support and wisdom over the last few years, this would not be happening.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.