ISO27001 – template – Applicable legislation for a UK SAAS Cloud company
One small but important aspect of an ISMS* is applicable legislation and regulation. When first starting our ISMS I struggled to come up with this list,
One small but important aspect of an ISMS* is applicable legislation and regulation. When first starting our ISMS I struggled to come up with this list,
The hacker, has posted what is purported to be the CIA director’s contacts list, as well as call logs of Deputy National Security Advisor Avril
The European Court of Justice (ECJ) today ruled that the self-certified protections promised by Safe Harbor weren’t worthy of Europe’s ideal of privacy “as a
In September I had an interesting morning at Criminal Justice Management 2015. Natalie Ceeney CEO HM Courts and Tribunals service gave a great overview on
We’ve rolled out over 60 changes in the last month, most were security related or minor bug fixes, but here’s a few you need to know
Security has it’s own set of acronyms and terms. Here’s a list you will find useful for your ISO 27001 and other security work, Security
When we started the road to ISO 27001 it was hugely daunting, a lot of unfamiliar terms and typical tech speak lingo made it all
We’ve been really busy working on the latest round of improvements to Projectfusion, as well as a few tweaks and fixes. This latest release focuses on making
Many businesses are now preparing or considering getting ISO27001 accredited, and it’s something you really should consider implementing if you host any kind of remotely sensitive
We hope you had a great break. We’ve been busy updating your Projectfusion instance. Q&A has had an update, now your managing teams can draft
Knowledge is power in M&A – raconteur.net Checking the details of deals is an essential step which, despite potential drawbacks, can ensure the success of
If you’re still using CD’s or DVD’s to archive important files, did you know they have an expected life span of 2-5 years? It is
Pre-planning a corporate virtual data room Great article above, with some great advice, my favourites: When constructing a VDR, it is often best to disclose
We would go so far to say, if it doesn’t have 2 factor authentication, don’t use it.. 2 factor authentication is a no longer an
We knew we had to make data room folder permissions easier, so we’ve crafted a 1 page interface that lets you see all your data
When choosing cloud services that will be hosting your data, it’s important to think about access to your content, and how you can get it.
Projectfusion will be offering 2 step authentication from August 14th. It’s simple for users, just requiring them to enter a token sent to their email
During a recent risk review we came up with a widespread risk: the 3rd party leaver.
If you share files with any external parties you need to think about this. It’s a big risk common to all services that let you share files with external people.
“There are indications that Verizon is legally required to provide certain things to the NSA, and that’s one of the reasons the co-operation with Verizon
The Information Commissioner’s Office (ICO) has published a new security report highlighting eight of the most common IT security vulnerabilities that have resulted in organisations failing to