{"id":1418,"date":"2018-11-21T13:14:15","date_gmt":"2018-11-21T13:14:15","guid":{"rendered":"https:\/\/iso27001.solutions\/?p=1418"},"modified":"2019-03-11T17:47:24","modified_gmt":"2019-03-11T17:47:24","slug":"why-is-demand-for-iso-27001-booming","status":"publish","type":"post","link":"https:\/\/ismsalliance.com\/trends\/about-iso-27001-standard\/why-is-demand-for-iso-27001-booming\/","title":{"rendered":"WHY IS DEMAND FOR ISO 27001 ISMS BOOMING?"},"content":{"rendered":"
This article will teach you:<\/strong><\/p>\n While ISO 27001 is one of the lesser known standards, compared to ISO 9001 and ISO 14001, it\u2019s increasing in popularity and demand.<\/p>\n Until now, it\u2019s been the 4th most popular standard after ISO 9001 for Quality Management, ISO 14001 for Environmental Management and OHSAS 18001 for Health and Safety.<\/p>\n However, that situation is changing. All businesses, charities, organisations and public sector bodies need to know what ISO 27001\u2019s all about, what the implications are and what can be done to achieve certification to the standard.<\/p>\n The Federation of Small Businesses (FSB) are certainly taking this seriously. 42% of their members have been directly affected and The FSB are calling for all businesses to take steps and assess the risks of online crime and fraud. The FSB has published its CyberCrime<\/a> strategy online.<\/p>\n This article will take you through the subject; the risks, the numbers and reasons why information security is so important. We\u2019ll cover the problems and challenges you may face when implementing ISO 27001, the consequences of ignoring them and what you can do to prevent the problems arising in the first place.<\/p>\n<\/div> For years, organisations have been primarily focused on making sure that physical security\u2019s in place – that\u2019s exactly what the insurance industry has demanded! If you failed to install the right padlock or levels of security, you could find yourself un-insured; which has made us all the more aware of physical security. The problem is that we\u2019ve forgotten about information security.<\/p>\n We all have processes in place for locking up at the end of the trading day, including key holders\u2019 responsibilities, tracking sets of keys and permitted access to premises. Nowadays, virtually all sporting venues have key coded doors to access changing rooms to reduce theft, and of course the same precautions are found in baby units at hospitals, nursery schools, etc.<\/p>\n We\u2019re very good at protecting physical things; chairs, tables, plant and stock, but when it comes to information we\u2019re not quite as diligent.<\/p>\n Businesses have been encouraged to identify risks of all shapes and sizes for years now, and once identified they must be managed, and risk mitigation must be considered. In the good old days, it was the physical risks that were so important, with a primary objective being to stay one step ahead of the thief!<\/p>\n First we had clear desks policies \u2013 putting away papers holding customer information. Filing cabinets were locked and confidential paper waste was shredded.<\/p>\n As soon as computers hit our desks, we had to start thinking about firewalls, anti-virus and malware, passwords, logins and access levels. As the internet and computer networks arrived, risks not only multiplied, but they became even more complex.<\/p>\n Having a password isn\u2019t enough now these days. It must be \u2018strong\u2019 (letters, numbers and symbols included), regularly changed and usually combined with a PIN too, not to mention auto lock-outs now happen in minutes, rather than not at all. Clear screen policies have now been added to the clear desk policy too.<\/p>\n Privileged access levels are commonplace and that goes for key stroke monitoring too. Personal email protocols, spam filters, email list security and file attachment rules now pervade businesses and employee handbooks. Dropbox (and similar), once the storage device of choice alongside remote plug in drivers, has now been joined by a plethora of cloud storage systems. Plug in devices also raise security issues now too.<\/p>\n Backups for systems, data lists and intellectual property were usually done with a remote device that someone took home. Now, with rapid technology developments, backups are far more sophisticated and complicated. This in turn increases risks and makes them even more complex.<\/p>\n Keeping your website safe and compliant is a business priority, especially if it\u2019s your main trading platform. Developing software is a challenge and upgrading existing software can be a problem too. Preventing your employees from uploading unchecked software is testing, but it\u2019s best practice to put this in place. Encryption and SSL padlocks are now the norm on websites and e-commerce platforms, but all of this needs managing and protecting. Utilising open-source coding is standard for many organisations today, but do you really understand what you\u2019re getting into?<\/p>\n Traditional pen and paper businesses are now conducted almost entirely on connected computers and stored in remote clouds that have portal logins for customers to access their files. Collaborative working, co-working spaces, home offices and coffee shop working continues to raise information security concerns and challenges.<\/p>\n <\/a><\/p>\n Another big question: is wireless secure or not, and does anyone really care anymore? Surely all we want now is to be connected! Gone are the days of VPN, ISDNs installations; and now BYOD (Bring Your Own Device) is requested for seminars, workshops and training courses. We just plug in, log on and go – assuming that everything will be okay.<\/p>\n It\u2019s certainly been a fast ride from the 1980s to today\u2019s online, connected and casual world. But as the world has changed, so have the risks you need to be aware of, manage and mitigate.<\/p>\n What all organisations need is an information security minded approach, with processes that allow the right people to access the right data at the right time. Collecting, storing, accessing and using data securely and effectively must be the goal for every organisation. It certainly is a major priority for big brands, and should also be for you.<\/p>\n<\/div> There are hundreds of security breaches that happen every day but in the end, they fall into 3 main groups:<\/p>\n IBM 2015 Cost of Security Breach Survey conducted by Ponemon Research, allocates 49% to malicious activity, 23% to system glitches and the remaining 28% to human error.<\/p>\n Just like the old fashioned theft of physical goods, these attacks are usually well planned, targeted and for the most part, have a negative impact on the business being targeted. Why is it that your network and computer were fine when you turned them off last night, but first thing this morning they don\u2019t work? These problems happen; they are illogical and we never usually know the reason why. When a product is badly made, how do you know if the ingredients for your production recipe is a \u2018system glitch\u2019 or intentional tampering by a disgruntled employee? The only way to find out and stop it happening again is to investigate, find, resolve and monitor.<\/p>\n The wonderful thing about people is that they are predictably, unpredictable! But as a manager this is a difficult one to manage because of the unpredictable nature of the risk, as you\u2019re unlikely to get any warning signs. <\/a><\/p>\n<\/div> Let\u2019s look at legal breaches first. Data Protection Act 1998 can result in prosecution, fines up to \u00a3500,000, loss of customer confidence and associated income levels. For many businesses this could lead to insolvency. In May 2018, the EU General Data Protection Regulation (GDPR) comes into force. From that date, breached organisations will find the fines they face increasing dramatically; with the new upper limit totaling \u20ac20 million.<\/p>\n The international standard for Information Security Management, ISO 27001, summarises the information security elements of the majority of global privacy regulations \u2013 including Principle 7 of the Data Protection Act \u2013 by providing a comprehensive framework for developing, implementing and maintaining an independently auditable Information Security Management System (ISMS).<\/p>\n ISO 27001 helps organisations protect their data assets and meet their compliance objectives. An ISO 27001 compliant ISMS is a risk-based approach to Information Security Management that addresses the specific security threats an organisation faces, covering people, processes and technology.<\/p>\n Accredited certification to ISO 27001 is recognized across the world as the hallmark of best practice Information Security Management, and demonstrates to customers, stakeholders\u00a0and staff alike that an organisation takes its data security responsibilities incredibly seriously.<\/p>\n\n
HOW WE GOT HERE<\/h3>\n<\/div>
3 CAUSES OF DATA BREACHES<\/h3>\n<\/div>
\n
\n
\nMany of us have had our email hacked or our phone tampered with by mischievous friends sending inappropriate texts to our contact lists. It can happen to anyone, it\u2019s usually just a matter of time.
\nPhishing, scams, hacking, fraud, cybercrime, theft of intellectual property (company T&Cs are the most commonly stolen text), data, systems and diversion of funds. Viruses and system\u00a0infections are also common. As businesses work hard preventing data theft by implementing more sophisticated systems, the perpetrators are working just as hard to always stay one step ahead.
\nE-commerce trading operations regularly undergo penetration testing and STAR simulated targeted attack response testing. This makes sure that their sites are safe and can continue to trade securely.
\nJust because you’re a small business doesn\u2019t mean you aren\u2019t a target. It might not even happen online – invoice fraud is an increasingly real threat.<\/p>\n\n
\nMost of the time the problem is solved and everyone gets back to work with a sigh of relief. Investigations should be commonplace, but sadly they only happen in a few cases.
\nWhere they do happen, it\u2019s this diligent approach to understanding what happened and why that makes an organisations\u2019 systems much stronger.<\/p>\n\n
\nThe news is littered with stories of companies where employees have left laptops or paper files on trains, lost phones, shared passwords they shouldn\u2019t have done, posted the wrong information at the wrong time on websites; the list goes on and on.
\nIn the USA there’s a website dedicated to daily security breaches. It\u2019s a great place to see the full extent of information security risks and is a bookmarked site for many IT specialists.<\/p>\nWHAT ARE THE\u00a0CONSEQUENCES?<\/h3>\n<\/div>