{"id":1583,"date":"2018-11-27T15:24:11","date_gmt":"2018-11-27T15:24:11","guid":{"rendered":"https:\/\/iso27001.solutions\/?page_id=1583"},"modified":"2019-03-11T18:32:35","modified_gmt":"2019-03-11T18:32:35","slug":"threat-of-cyber-attacks","status":"publish","type":"page","link":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/","title":{"rendered":"CASE STUDY SURVEYGIZMO"},"content":{"rendered":"

“The entire certification journey to implement ISO 27001 was simple and easy to navigate. We were able to move seamlessly through each stage. Overall, implementing ISO 27001 has been a positive experience to\u00a0mitigate the threat of\u00a0cyber-attacks\u00a0that has benefited our business.”<\/i><\/h2>\n

Goran Perika, SurveyGizmo Chief Executive Officer<\/p>\n<\/div>

<\/div><\/div><\/div><\/div><\/div>

SurveyGizmo Achieves ISO 27001 Certification Key Benefits:
\n\u2022 Provides evidence of complying with the IT security elements of GDPR
\n\u2022 Allows for wider availability within public sector organisations
\n\u2022 Mitigate the threat of cyber-attacks
\n\u2022 Manages the risk of storing valuable digital information<\/p>\n<\/div>

<\/div><\/div><\/div>

\u201cAchieving ISO 27001 in 2015 has been crucial for winning tenders.\u201d<\/em><\/p>\n<\/div><\/div><\/div>

<\/div><\/div><\/div><\/div><\/div>

EXECUTIVE SUMMARY<\/strong>
\nWith ISO 27001, SurveyGizmo\u00a0now have an information security management system that ensures they follow best practice with regards to preventing cyber-attacks<\/a> and keeping their clients\u2019 data safe.<\/p>\n

ABOUT SmartSurvey<\/strong>
\nSurveyGizmo is the UK\u2019s leading online survey tool, providing software to organisations worldwide. They serve customers in the private and public sectors including; IKEA, Parkinson\u2019s UK, Alton Towers, and many more.<\/p>\n

CERTIFICATION JOURNEY<\/strong>
\nSurveyGizmo benefited from our friendly and pragmatic approach, utilizing our
toolkit<\/a> to help them build an effective management system with no prior knowledge.
\nSurveyGizmo told us, \u201cthe entire certification journey to implement ISO 27001 was simple and easy to navigate. We were able to move seamlessly through each stage.\u201d<\/em><\/p>\n<\/div>

<\/div><\/div><\/div>

ISMS ALLIANCE<\/a>\u00a0are very proud\u00a0of our auditors. Unlike many of\u00a0other competitors, they don\u2019t use subcontractors – they can guarantee a consistent and pragmatic approach to auditing<\/a>.<\/p>\n

SurveyGizmo felt the benefit of\u00a0this. They told us, \u201cour auditor was professional and thorough, working through the entire process systematically.\u201d<\/em><\/p>\n

ISO 27001<\/strong>
\nIn a time when information security\u00a0is vital for businesses, the ISO 27001 standard is widely regarded as the best way to protect your clients\u2019 data. This is achieved by introducing procedures that are designed to mitigate the threat of
cyber-attacks<\/a>.<\/p>\n

SurveyGizmo told us this was a core motivation for them. However,\u00a0ISO 27001 can also open doors. SurveyGizmo told us they\u2019ve used it to win some significant contacts.<\/p>\n

\u201cAchieving ISO 27001 has been crucial for winning tenders in the government sector where data security is of paramount importance. Security is our most important feature and we take it very seriously.\u201d<\/em><\/p>\n<\/div>

<\/div><\/div><\/div>

Here at ISMS ALLIANCE, we\u2019re working with the United Kingdom Accreditation Service, meaning an ISO certificate from us is guaranteed to be accepted in public sector contracts.<\/p>\n

GDPR<\/strong>
\nThe upcoming General Data Protection Regulation (GDPR) supersedes the Data Protection Act 1998. GDPR creates new requirements for organisations that process EU residents\u2019 personal data and allows authorities to enforce fines of up to 4% of annual global turnover.<\/p>\n

SurveyGizmo told us, \u201cWith GDPR being enforced next May, having ISO 27001 certification will position SurveyGizmo in a good place to help ensure security compliance for customers and increase our professional reputation.\u201d<\/em><\/p>\n

GDPR encourages the use of ISO 27001 to demonstrate that the organisation is actively managing its data security in line with international best practice.<\/p>\n<\/div>

<\/div><\/div><\/div><\/div><\/div>
<\/span><\/a><\/span>
<\/i><\/div>

ISO 27001 ISMS Consultancy<\/h2><\/a><\/div>
<\/div>
\n

The ISO 27001 Online Consultancy Service will have you ready for accredited certification to ISO 27001:2013 in just a few months.<\/p>\n

You will be able to implement an ISMS (information security management system) and develop documentation that is suitably scaled to the size of your organisation.<\/p>\n<\/div>

<\/div>Learn More<\/a>
<\/div><\/div><\/div>
<\/div><\/div><\/div><\/div>
<\/div><\/div><\/div>
<\/span><\/a><\/span>
<\/i><\/div>

Managed Services<\/h2><\/a><\/div>
<\/div>
\n

Outsource the management and maintenance of your ISMS to the experts.<\/p>\n

Benefit from the reliable advice and practical experience of an ISMS specialist to manage, maintain, audit and continually improve your ISMS in line with the requirements of ISO 27001:2013.<\/p>\n<\/div>

<\/div>Learn More<\/a>
<\/div><\/div><\/div>
<\/div><\/div><\/div><\/div>
<\/div><\/div><\/div><\/div><\/div>
<\/div>
<\/div><\/div><\/div>

Ready to talk?<\/h2>\n<\/div>
<\/div>
<\/div>
<\/div>
Let’s Talk<\/span><\/a><\/div>
<\/div><\/div><\/div>
<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"yoast_head":"\nCASE STUDY SURVEYGIZMO < Mitigate the threat of cyber-attacks<\/title>\n<meta name=\"description\" content=\"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CASE STUDY SURVEYGIZMO\" \/>\n<meta property=\"og:description\" content=\"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ISMS ALLIANCE\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-11T18:32:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/\",\"url\":\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/\",\"name\":\"CASE STUDY SURVEYGIZMO < Mitigate the threat of cyber-attacks\",\"isPartOf\":{\"@id\":\"https:\/\/ismsalliance.com\/#website\"},\"datePublished\":\"2018-11-27T15:24:11+00:00\",\"dateModified\":\"2019-03-11T18:32:35+00:00\",\"description\":\"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ismsalliance.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CASE STUDY SURVEYGIZMO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ismsalliance.com\/#website\",\"url\":\"https:\/\/ismsalliance.com\/\",\"name\":\"ISMS ALLIANCE\",\"description\":\"Manage your ISMS online\",\"publisher\":{\"@id\":\"https:\/\/ismsalliance.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ismsalliance.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ismsalliance.com\/#organization\",\"name\":\"ISMS ALLIANCE\",\"url\":\"https:\/\/ismsalliance.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ismsalliance.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ismsalliance.com\/wp-content\/uploads\/2018\/11\/iso-iec-27001-2013-1.png\",\"contentUrl\":\"https:\/\/ismsalliance.com\/wp-content\/uploads\/2018\/11\/iso-iec-27001-2013-1.png\",\"width\":148,\"height\":136,\"caption\":\"ISMS ALLIANCE\"},\"image\":{\"@id\":\"https:\/\/ismsalliance.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CASE STUDY SURVEYGIZMO < Mitigate the threat of cyber-attacks","description":"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/","og_locale":"en_GB","og_type":"article","og_title":"CASE STUDY SURVEYGIZMO","og_description":"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.","og_url":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/","og_site_name":"ISMS ALLIANCE","article_modified_time":"2019-03-11T18:32:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/","url":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/","name":"CASE STUDY SURVEYGIZMO < Mitigate the threat of cyber-attacks","isPartOf":{"@id":"https:\/\/ismsalliance.com\/#website"},"datePublished":"2018-11-27T15:24:11+00:00","dateModified":"2019-03-11T18:32:35+00:00","description":"implementing ISO 27001 has been a positive experience that has benefited our business.This mitigate the threat of cyber-attacks.","breadcrumb":{"@id":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ismsalliance.com\/threat-of-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ismsalliance.com\/"},{"@type":"ListItem","position":2,"name":"CASE STUDY SURVEYGIZMO"}]},{"@type":"WebSite","@id":"https:\/\/ismsalliance.com\/#website","url":"https:\/\/ismsalliance.com\/","name":"ISMS ALLIANCE","description":"Manage your ISMS online","publisher":{"@id":"https:\/\/ismsalliance.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ismsalliance.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ismsalliance.com\/#organization","name":"ISMS ALLIANCE","url":"https:\/\/ismsalliance.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ismsalliance.com\/#\/schema\/logo\/image\/","url":"https:\/\/ismsalliance.com\/wp-content\/uploads\/2018\/11\/iso-iec-27001-2013-1.png","contentUrl":"https:\/\/ismsalliance.com\/wp-content\/uploads\/2018\/11\/iso-iec-27001-2013-1.png","width":148,"height":136,"caption":"ISMS ALLIANCE"},"image":{"@id":"https:\/\/ismsalliance.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/pages\/1583"}],"collection":[{"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/comments?post=1583"}],"version-history":[{"count":0,"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/pages\/1583\/revisions"}],"wp:attachment":[{"href":"https:\/\/ismsalliance.com\/wp-json\/wp\/v2\/media?parent=1583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}