{"id":136,"date":"2015-11-10T08:37:18","date_gmt":"2015-11-10T08:37:18","guid":{"rendered":"https:\/\/iso27001.solutions\/?p=136"},"modified":"2019-03-11T17:01:37","modified_gmt":"2019-03-11T17:01:37","slug":"new-to-information-and-cyber-security","status":"publish","type":"post","link":"https:\/\/ismsalliance.com\/trends\/about-iso-27001-standard\/new-to-information-and-cyber-security\/","title":{"rendered":"New to information and cyber security?"},"content":{"rendered":"

Let\u2019s get you started.<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

Are you thinking about improving your information security posture?<\/p>\n

Have you been advised to do it by a switched on customer to win or retain their business?<\/p>\n

Perhaps you\u2019re confused about jargon like ISMS or ISO 27001 and the options around it?<\/p>\n

If you\u2019re wondering how this all fits together or what you should do first,\u00a0let\u2019s start from the beginning\u2026<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

What is an ISMS?<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

An Information Security Management System<\/h2>\n

describes and demonstrates<\/em><\/strong>
\nyour organisation\u2019s approach to Information Security.<\/p>\n

It includes how people, policies, controls and systems identify, then address the opportunities and threats<\/strong><\/em> revolving around valuable information<\/em><\/strong> and related assets.<\/p>\n

Cyber security is all about addressing technology led threats. Effective cyber security solutions are part of the broader ISMS.<\/p>\n<\/div><\/div><\/div>

<\/div><\/div><\/div><\/div><\/div>
<\/a><\/span><\/div><\/div>
<\/div><\/div><\/div><\/div><\/div>

There are good reasons for you to invest in an ISMS<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

The facts speak for themselves\u2026<\/strong><\/em><\/p>\n

The average cost of a security breach is \u00a31.46m \u2013 \u00a33.14m to a large organisation, and \u00a375k \u2013 \u00a3311k to a small business.
\nOrganisations face fines up to 4% of global turnover for a breach (under EU GDPR in 2018).<\/p>\n

Suppliers will not get past basic customer evaluation criteria without effective information security credentials so there is little chance to grow a business.
\nStatistics taken from the Government Information Security Breaches Survey 2015 and a range of other recent reports on the subject.<\/p>\n

Done well, an ISMS will help your organisation improve and grow.<\/strong><\/em><\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

What\u2019s included in an ISMS?<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

An effective Information Security Management System is made up of 5 elements, as shown in our pie chart.<\/p>\n

The real size of these pie slices, in terms of time and cost, is all dependent on your objectives, your starting point, the scope you want to include in your ISMS, and your organisation\u2019s preferred way of working.<\/p>\n

Investing well in one slice will help reduce or avoid much larger investments in the other slices. But beware the pitfalls, such as following the cheap policy documentation route, as it will cost you much more in the long run.<\/p>\n<\/div>

<\/span><\/div><\/div>
<\/div>
<\/div>
<\/div>

A trusted ISMS will follow recognised standards<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

There are different levels of information and cyber security maturity, as well as different standards you can achieve to evidence compliance.<\/p>\n

Those standards might be dictated by the nature of your business, its goals or your customer\u2019s expectations.<\/p>\n

Whatever your requirements, there is a proven approach that you can follow.<\/p>\n

\"\"<\/a><\/p>\n

\"\"<\/a>\u00a0\u00a0\"\"<\/a>\u00a0\u00a0\"\"<\/a>\u00a0\u00a0\"\"<\/a><\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

How to implement an ISMS ?<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

Now that you have a better understanding of ISMS and have considered what you should do, you\u2019ll also be thinking about how to do it as well. Whether you take a DIY approach, or bring in others to help, those five pieces of the pie will need investment for ISMS success.<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

Why consider our powerful ISMS cloud software?<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

Your focus will be on growing your business, not spending time developing the tools and technology to manage an ISMS. After all, the opportunity cost of losing focus and time could be expensive.<\/p>\n

There were no attractive solutions when we started out on the road to managing information security, and that\u2019s why we built ISO27001.solutions. Now you can benefit too. We\u2019ll equip you for success at a fraction of the cost and time of alternatives or you trying to build it yourself.<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

We make it simple<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>

It\u2019s easy to build your ISMS using our software solution. ISO27001.solutions facilitates improved results with everything you need for success in one secure online environment.<\/p>\n<\/div>

<\/div>
<\/div>
<\/div>

ISO27001.solutions capabilities include:<\/h3>\n<\/div>
<\/div>
<\/div><\/div>
<\/div>