
3rd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

2nd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

URM delivered a question and answer session where it compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

With this blog, the spotlight turns to internal audit and specifically in the context of ISO 27001, the International Standard for ISM.

When managing the security of your organisation’s information assets, you will need to consider the scope of what you are doing.

The need for guidance on how organisations should best protect privacy and manage personal information has never been more pertinent.

The EU GDPR and the UK DPA both require organisations to protect and ensure the privacy of any personal data which they process.

Is there a catch-all international standard that effectively proves external verification of data protection compliance?

We have seen an increased focus on the General Data Protection Regulation (GDPR) by certification body (CB) assessors when conducting ISO 27001 audits.

Executing your decision to use an information security management system (ISMS) to manage the security of your information assets is a project. It is not.

There are many good reasons to implement an information security management system (ISMS) and get it certified to ISO 27001.

In this blog, we’re going back to basics and looking at some of the fundamentals of information security and ISO 27001.

In this blog, we’ll take a look at management commitment, one of the most significant.

URM assisted over 350 organisations achieve ISO 27001 certification, here are the critical steps when implementing an effective information security system.

ISO 27001 is a standard for Information Security Management that provides any organisation with a framework to protect most valuable assets.

There is some confusion about the difference between having an ISMS which is certified to ISO 27001 and one which is compliant or aligned to the Standard.
As a CREST-accredited penetration testing organisation, URM can complete internal and external penetration tests.
As a PCI QSA, URM can assist you with a range of services, including conducting gap analyses, helping you reduce your CDE scope and conducting penetration tests.
URM has developed a web-based learning management system, Alurna, which can be used to raise awareness of information security threats such as phishing.