14 Oct ISO 27001 Certification | Category - Pivot Point Security Include Domain Name Ransom or Cybersquatting in Your ISO 27001 Risk Assessment October 14, 2014 By John Verry ISO 27001 works great—assuming that you are great at risk assessment. If you miss a risk, you may be vulnerable, and unfortunately som... Continue reading
09 Oct ISMS Consulting Has Your Business Correctly Assessed Its Information Security Risks? October 9, 2014 By Richard Barrus Risk is all about perception. We often make decisions about how to stay safe based on the perception of risk rather than on the actual ... Continue reading
23 Sep ISMS Consulting When To Encrypt Data September 23, 2014 By Richard Barrus A major mistake some organizations make is to consider data encryption as the solution for all their information security needs. “ENCRY... Continue reading
09 Sep ISO 27001 Certification | Category - Pivot Point Security Leveraging an Existing SOC 2 to Simplify ISO 27001 Certification January 19, 2024 By John Verry What is the most efficient way to get ISO 27001 certified if you already have your SOC 2 attestation? It’s not uncommon for an organiz... Continue reading
19 Aug ISO 27001 Certification | Category - Pivot Point Security Will Nonconformities Prevent My Firm from Achieving ISO 27001 Certification? January 14, 2024 By John Verry One of the most frequently misunderstood elements of the ISO 27001 certification process is the area of “findings” and/or nonconformiti... Continue reading