03 Mar ISMS Consulting The Cybersecurity Canon: Books Every Cybersecurity Professional Should Read March 3, 2015 By Richard Barrus Rick Howard, the Chief Security Officer at Palo Alto Networks, has a project going called The Cybersecurity Canon. It’s a list of “must... Continue reading
04 Dec ISMS Consulting Background Checks: Recommended But Not Required December 4, 2014 By John Verry A client recently asked me about the need to perform background checks on employees as part of their ISO 27001 compliance efforts. Bein... Continue reading
21 Oct ISMS Consulting Are Your Calls Being Intercepted? More on Rogue Cell Phone Towers October 21, 2014 By John Verry Recently we blogged about rogue cell towers (also called IMSI catchers, stingrays or GSM interceptors) and the potential risk they pose... Continue reading
09 Oct ISMS Consulting Has Your Business Correctly Assessed Its Information Security Risks? October 9, 2014 By Richard Barrus Risk is all about perception. We often make decisions about how to stay safe based on the perception of risk rather than on the actual ... Continue reading
23 Sep ISMS Consulting When To Encrypt Data September 23, 2014 By Richard Barrus A major mistake some organizations make is to consider data encryption as the solution for all their information security needs. “ENCRY... Continue reading