South Africa has a mature history of implementing management systems for key areas, specifically Quality, Environment and Health & Safety. This focus was driven by the large multinational organizations and the historically strong South African Mining industry which either were compelled to by regulatory or contractual drivers or did so…
Tag
INFORMATION SECURITY
Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and archiving computer data that can be used to restore the original data after the occurrence of a data loss event…
Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so…
Securing critical business information has become increasingly important for growing organizations. Information Security Policies are effective tools to communicate management’s commitment and expectations from employees and stakeholders regarding security. The purpose of this article is to provide an overview of information security polices, including their objective, types, and development lifecycle.…
Worldwide there are several reasons for project start-ups, but what are the real reasons behind it. Another question to be asked here is “is there enough attention for Information Security in projects”? The drawbacks of information security are both project and business risks. Referring to the investigation of Price Water…
In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…
Four reasons why Traditional Information Security fails in Agile Environments While agile development is going mainstream, information security is having difficulties to keep pace with such short-term planning perspectives and instant changes in strategies. The result of this struggle is that new systems are insecure, or that they are loaded…
Announcing with gratitude, The PECB Standards Insights Conference will be held in “Palais des congrès de Montréal” from June 29th to 30th, 2017. Attending this conference at the vibrant city of Montreal, Canada, will complement your professional opinions and reveal many future occurrences and disputable matters with respect to Management…
Implementing ISO/IEC 27001 in your organization entails that you formally document the scope of your Information system which means that you want to know the exact information that you want to protect and will be prepared to protect it. This way, you are keeping safe your organization’s information’s system by…
The importance of information security in our lives is widely understood by now. Investments of organizations into information security keep growing, but also do cybercrime risks and costs of data breaches. By their very nature, financial institutions are an attractive target for attackers. Also, the data breach costs per capita…