Search for content, post, videos
daniel-seid-ISO-IEC-27001-Certified
0 COMMENT
4656 Views
Between Profession & Family

The Story of Daniel Seid, a PECB Certified ISO/IEC 27001 Master Looking back over the last decade, it’s remarkable how much PECB’s network has achieved and advanced professionally. Such advancement is not only a result of our training development and deliverables, but also of the ways by which we’ve been…

ISO-22301-business-continuity-meeting-team
0 COMMENT
19397 Views
ISO 22301:2019 What Will Change?

The first edition of ISO 22301 was launched in May 2012. It was the first truly internationally accepted standard on business continuity, and it consists of requirements to implement a Business Continuity Management System according to ISO Annex SL. As such, it stood in line with its prominent predecessors such…

5-G-Smart-Cities-future
0 COMMENT
5719 Views
Will 5G Be the Platform for Tomorrow’s Smart Cities?

Connectivity is one of the main pillars that are defining life in the 21st century. The level of depth that connectivity defines our routines in this century is truly astonishing. With a particular boost after the first decade of the century, we have developed not only habits, but entirely new…

Marriott-cyber-attack-breach-security
0 COMMENT
4489 Views
Marriott’s’ 500 Million Data Breach Scandal

A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…

Melbourne-best-city-live
0 COMMENT
5151 Views
Melbourne | The Best City to Live on Earth

Melbourne has been considered “the most livable city in the world” over the past seven years, this year being dethroned by Vienna, the Austrian capital, according to the Economist Intelligence Unit‘s 2018 rankings. I am originally from Romania and before deciding to live in Melbourne, we lived in Adelaide, South…

past-future-global-security-privacy-worldwide
0 COMMENT
3561 Views
Remembering the Past | Engendering the Future

The philosopher Santayana is famous for having once warned: “Those who cannot remember the past are condemned to repeat it.” Recent events have provided several sobering examples of just how true that is. The Apple-FBI dispute was perhaps one of the most recent, painful examples we’ve witnessed a debate the…

catch-wave-jobs-of-the-future
0 COMMENT
4896 Views
Catch the Wave: What are the Jobs of the Future?

We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…

engagement-communication-happy-employees-team
0 COMMENT
4807 Views
7 Communication Keys To Greater Engagement

We’re living and working in an amazing time. Continual improvements in technology are nothing short of mind-blowing. But we’re also living and working in a time that is mind-disturbing, because we are more connected but less engaged than ever before. Indeed, numerous studies over the last couple of decades keep…

leadership-hope-corporate-culture
0 COMMENT
4392 Views
Top Tips for Infusing Hope into Your Corporate Culture

When your team is faced with changes, challenges, or chaos, inspire them with a future-focused vision of shared success! You may never encounter such traits in a job description for an executive position, but there are four key characteristics that followers want their leaders to have: compassion, stability, trust, and hope.…

3D-Printing-technology-printers-home
0 COMMENT
5377 Views
3D Printing: The State of the Art Technology

One of the most revolutionary technologies of this century is 3D printing, and this technology is already a reality. Will 3D printing remove the need to go to the store to get the things we need? Will we really be able to download things that we need and print them…

hacker-ethical-hacking-security
0 COMMENT
5092 Views
Ethical Hackers | In the Spotlight of the Security World

One of the biggest threats in today’s digital era comes from cybercriminals. According to CSO, it is predicted that damages from cyber-crimes will cost around $6 trillion annually by 2021. The term hacker is often used with a negative connotation by the media and the Hollywood industry. Given that this…

smart-home-technology
0 COMMENT
5073 Views
Redefining our Living with Smart Home Technology

Technological developments are intensely shifting our possibility frontiers by changing the way we interact, think, and operate. Smart home gadgets and products are becoming increasingly popular due to their genuine usefulness. If you are thinking about transforming your home and turning it into a ‘smart home’, you are not alone. According…

soft-skills-leadership-achievement - Copy
0 COMMENT
4528 Views
Why Soft Skills Are The New Bottom-Line?

The argument about “Hard skills vs soft skills” and which one is more important or more necessary is as old as “Are great leaders born or developed”. Both sides have compiled convincing arguments, but throughout the thirty plus years, I’ve been serving personal and professional leaders, I’ve come to realize…

electric-car-power-station
0 COMMENT
5071 Views
Electric Cars: Is This The Start Of An Automotive Revolution?

Over the past years, we have been warned from numerous studies about potential job displacement due to ‘automation’ – namely the combination of robotics, artificial intelligence, and other technologies. Even though there is a great challenge in applying machines to tasks that require flexibility, judgment and common sense, the technological…

food-safety-ISO 22000
0 COMMENT
4562 Views
New Edition of ISO 22000 just out!

With over two hundred diseases spread through the food chain, it’s clear that safe, sustainable food production is one of our greatest challenges. Globalization of the food trade further complicates food safety and the new edition of ISO 22000 on food safety management systems presents a timely response. Food safety…

businessman-apps
0 COMMENT
4893 Views
Six Recommended Apps for Businesses

How many times have you heard the phrase “There’s an app for that.”? The truth is that there is an app for almost everything and in one way or another; these apps are making our everyday lives easier. In the near future, apps are expected to become a regular and essential…

leadership-working-hard-employee
0 COMMENT
4512 Views
The Attention Deficit in the Workplace

The Answer Starts With You! You are a role model to someone. The expression “tone at the top” is true. The example leaders demonstrate is often believed to be a requirement employees must follow. No matter what is written in policy handbooks or said aloud, the traits leaders demonstrate, others…

cryptocurrency-bitcoin-blockchain
0 COMMENT
4248 Views
The Cryptocurrency (R) evolution

Cryptocurrency was introduced for the first time in the course of the Second World War as the need for secure communication grew. Since then, it has evolved in the digital era with mathematical theory elements and computer science to encrypt online money, information, and communication. Yet, cryptocurrencies made their most…

travel-portugal-ancient-Pena-national-palace
0 COMMENT
4472 Views
How to Road Trip in Portugal

Portugal may be small but it’s filled with both big and beautiful surprises. Everything from the cuisine, the views, the sandy beaches, the great and cheap food to the hospitality and incredible weather will make you fall in love with this country. If Portugal ranks high on your list of…

blockchain-digital-technology
0 COMMENT
5544 Views
The Technology Behind Blockchain

The Blockchain technology has seen widespread adoption and praise, but it has also received the reputation for being complicated or difficult to understand. On the contrary, Blockchain technology is not as complicated to understand as it seems. This article will provide a definition of the Blockchain technology, and also an…

travel-exotic-Barbados-Caribbean
0 COMMENT
4343 Views
Barbados | Place for Relaxation Seekers

Imagine dipping your feet into crystal clear waters, and mentally float away to the sounds of gentle waves and tropical breezes of Barbados – the most vibrant Caribbean island. As a place that offers a perfect blend of adventure, culture, and history, Barbados for many of its’ visitors becomes a…

sustainable-smart-city
0 COMMENT
4590 Views
Smart Cities and a Sustainable Future

Many developments in technology promise to be a paradigm shift or world changing so much so that it can be difficult to distinguish the hype from the reality. One of these latest “hot terms” is Smart Cities but what exactly is a Smart City and how can a Smart City…

emotional-intelligence-leadership
0 COMMENT
5149 Views
Emotional Intelligence: Make Sense Out Of Senselessness

Emotions, as a state of feeling, are those that shape one’s destiny, help one understand and empathize, and are those that one obeys to without realizing it. While some continue to view emotions as “acute disturbances of the individual,” there is a general shift of beliefs from emotions being considered…

berkeley-research-group
0 COMMENT
4387 Views
Special Encounter with Berkeley Research Group

In today`s competitive world, it is very difficult for businesses to survive, and even more difficult to stand out in the market. For this reason, many companies are devoting their time and investing their budgets on the ISO standards. Many companies prefer to do business with ISO certified organizations or hire…

Myanmar-destination
0 COMMENT
4819 Views
Myanmar: The Golden Land

Once upon a time, a consultant was tired, stressed and zealously wanted to please a customer by meeting an unrealistic deadline. Overwhelmed by the amount of tasks, I kept working on my laptop not realizing that the gentleman sitting next to me was so relaxed and serene as if the…

leadership-skills-mechanism
0 COMMENT
7658 Views
The Mechanisms of Leadership

Great leadership remains the basic prerequisite for organizations to succeed in nowadays business environment. Taking into consideration that the elementary principle of leadership has remained the same over the years, it is important to analyze the evolution of leadership habits and describe the importance and strategies of productivity. A valuable…

0 COMMENT
7573 Views
How is Legg Mason Complying with ISO 37001?

ISO 37001 is the only anti-bribery management system in the business world. Introduced in October 2016, this international standard was designed to advocate a series of measures that, when implemented, help public or private companies of all sizes prevent and tackle bribery. Legg Mason is one of the first companies…

0 COMMENT
4851 Views
A talk with the man behind “DONNIE BRASCO”

The ISO 37001 & Anti-Bribery PECB Insights Conference introduced us to the former FBI agent, Joe Pistone, who lived six years in the Mafia underworld, winning the trust of the most notorious mobsters, infiltrating the Bonanno and Colombo crime families, and gathering damning evidence that helped put more than a…

ISO 9001-QMS-company
0 COMMENT
5432 Views
You have already implemented ISO 9001 in your company! How do you align your project to your QMS?

A research done by Basak Manders, a Quality Management research expert, found that ISO 9001 quality management standard has been implemented by more than one million organizations in 187 countries since its introduction in 1987. According to the research, ISO 9001 implementation ensures operational and market benefits in the majority…

Morocco-small-business
0 COMMENT
6417 Views
Management and Certification Systems: A Case study in Moroccan SME’s

Regardless of size, location or industry, businesses today face growing demands for profitability, operational efficiency, quality, innovation, and technology that enhance the sustainable development. In order to turn these pressures or challenges into a competitive advantage, companies need to develop an efficient and sound management tailored to the business processes…

Disaster-Recovery-Recovery-Program
0 COMMENT
4394 Views
Developing Effective Disaster Recovery Programs

Worst Case Scenarios When planning for disasters, we tend to plan for “worst case” scenarios.  Yet again we are surprised when the “worst case” based plan that has been developed is superseded by an actual event that occurs.  Hurricane Katrina taught us this lesson.  Will we be going back to…

travel-work-animals
0 COMMENT
4433 Views
Combining business with pleasure in Tanzania

Tanzania is one of the most diverse places I’ve ever been to on this planet. The Indian Ocean in the east, Lake Victoria in the west, Kilimanjaro Mountain in the north, a range of world famous national parks across the entire country and the colorful people to complete the picture.…

dollars-office-mistake
0 COMMENT
4578 Views
More backup dollars than security dollars

Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and archiving computer data that can be used to restore the original data after the occurrence of a data loss event…

wind-power-plant-energy-efficient
0 COMMENT
4248 Views
Energy-efficient Technologies and Measures of ISO 50001

Evaluating and Prioritizing the Implementation of New Energy-efficient Technologies and Measures of ISO 50001 Our Current Situation The increasing gas emissions are having a high impact on the concentration of greenhouse gases in the atmosphere. This is causing the global temperature to increase constantly. As a result, organizations worldwide are…

Agile-Security-Information-group-work
0 COMMENT
8492 Views
Matching Information Security and Agile: Volume 2

Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so…

Business-Email-Scam-Cyber
0 COMMENT
5548 Views
Growing Threats Of Business Email Compromise Scams

Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous nature of the Internet, cyber criminals are calling the shots; constantly blazing new trails in increasing sophistication in cybercrime and profiting unscrupulously off the backs of…

Quality-Control-Woman-Factory
0 COMMENT
5007 Views
Improving Process Control Through QMS

Is quality control really improving internal processes? The purpose of implementing a process approach aims to enhance the organization’s level of effectiveness and efficiency to achieve its defined objectives. Simply put, a process transforms inputs into outputs. This is done seamlessly when the process is planned; plans are executed, checked,…

0 COMMENT
58 Views
Q&A from the Webinar

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity In an era where digital transformation is inevitable, the cybersecurity landscape is constantly evolving. This article delves into key topics discussed in our recent webinar, including the Digital Operational Resilience Act (DORA) and its implications, the ISO/IEC…

0 COMMENT
286 Views
Identity management: What you need to know

Modern-day security breaches like the SolarWinds or T-Mobile attacks are not one-off events; they are prime examples of how someone can steal your organization’s credentials and use them to gain illegitimate privileged access to sensitive assets. Data breaches happen daily, and in too many places at once to keep count.…

0 COMMENT
364 Views
Navigating DORA: Practical Steps for ICT Suppliers

In today’s landscape, operational resilience is crucial, especially for financial services reliant on information and communication technology (ICT). The Digital Operational Resilience Act (DORA) aims to fortify this resilience by setting regulatory requirements for financial institutions and their ICT suppliers. DORA is more than just a regulation—it is a shift…

0 COMMENT
488 Views
The Lifestyle of an Ethical Hacker

Movies have accustomed us to envision unethical hackers as highly antisocial individuals, often with some type of complex, either due to lack of ego or an excess of it, who live lives filled with thrills, type 100 words per minute, never use a mouse, only have a black wallpaper, and…

0 COMMENT
547 Views
Why sustainable development is built on quality

The world is full of colour and energy. Human ingenuity has harnessed this vibrancy to build truly amazing things. It is also this ingenuity that drives us to perpetually innovate and create, shaping the future we will all inhabit. But for us to make progress on challenges – from renewable…

0 COMMENT
646 Views
The Boardroom: Digital Liabilities

Digital transformation has enabled businesses to compete globally, fostering innovation and growth and creating operational diversities-providing competitive business edges in highly competitive markets. With emerging technologies like AI, the ever-expanding technological edge has further enhanced efficiency, simplification, and creativity in product and service development, and operations, thus, paving the way…

0 COMMENT
625 Views
Remote patient monitoring: A guide for healthcare specialists

In the quiet suburbs of small-town Canada, Hannah, an 80-year-old retiree, faced a daunting health challenge. Diagnosed with congestive heart failure, she grappled with frequent hospital visits, medication adjustments, and the constant fear of exacerbations. But then came a game-changer: remote patient monitoring (RPM). In healthcare, effective diagnostics rely on…

0 COMMENT
1129 Views
Cloud Security and Data Sovereignty: Strategies for a Secure Digital Future

As digital transformation accelerates, cloud computing has become a cornerstone of modern business operations. While the cloud offers unparalleled flexibility, scalability, and cost savings, it also introduces new security challenges. Ensuring robust cloud security and navigating the complexities of data sovereignty is crucial for protecting sensitive information and maintaining regulatory…