0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn Follow Aristi Ltd on Google Plus

INFORMATION MANAGEMENT SYSTEMS.
MADE STANDARD.

You are here:

ISO27001 Compliance.

What is ISO 27001?

Information is a critical asset for every organisation whether they operate in the public or private sector. It is therefore vital to appropriately protect that information and the systems it resides on. Security breaches cost UK companies millions of £’s every year, and it is not only financial cost that impacts – damage to reputation and client confidence can have as detrimental an affect as loss of availability. In fact in August 2010 the UK operation of Zurich Insurance was fined a record £2.28m for losing the confidential personal details of 46,000 British customers. It is the highest fine levied by the Financial Services Authority on a single company for data security failings.

Information comes in many forms including personnel data, financial records, customer information and business strategy. And if you store, manage or process information for your customers you also have responsibility for the security of their data as well as your own! It is therefore vital to implement appropriate security controls to protect not only the assets but your brand reputation, and potentially that of your customer, and if you think IT alone is the answer you couldn’t be further from the truth. Over 80% of security breaches come from within the organisation as a result of poor policy, procedures and staff awareness training.

That’s why organisations are exploring the benefits of complying or certifying to ISO/IEC 27001:2013. This standard provides a baseline minimum set of controls which cover the people, places and process requirements you need in order to provide staff, suppliers and customers with confidence in your data security. Certifying to the standard can give a real competitive edge in today’s technology led environment and we have a proven track record in taking companies through the process to successful certification.

What are the benefits of compliance?

ISO/IEC 27001:2013 is the only auditable standard that provides a framework for establishing an Information Security Management System (ISMS). Certifying your ISMS against ISO/IEC 27001:2013 can bring the following benefits to your organization:

  • Demonstrates the independent assurance of your internal controls and meets corporate governance and business continuity requirements
  • Independently demonstrates that applicable laws and regulations are observed
  • Provides a competitive edge by meeting contractual requirements and demonstrating to your customers that the security of their information is paramount
  • Independently verifies that your organizational risks are properly identified, assessed and managed, while formalizing information security processes, procedures and documentation
  • Proves your senior management’s commitment to the security of information held by the organisation
  • The regular assessment process helps you to continually monitor your performance and improve
What can we do to help?

Our objective is to reuse as much of your existing investment in security policies and procedures as possible. In order to achieve this, our approach is based on working with you to understand what has been achieved to date, update and implement policies and procedures as required to meet the standard, develop an Information Security Management System (ISMS) and implement a security awareness program to enforce compliance.

Our approach is based on the following activity:

  • Understand the your business, processes and procedures
  • Work with you to define a scope for the ISMS in relation to key assets and business processes.
  • This will form the basis for the subsequent compliance implementation activities
  • Review the existing asset list and risk assessment methodology and use this or suggest an alternative as required to conduct a risk assessment against the ISMS scope. Determine appropriate management action and priorities for managing information security risks
  • Review the existing security policy documents, update them as required to meet ISO/IEC 27001:2013 requirements and work with you to implement the policies
  • Develop a Statement of Applicability and provide advice and guidance on the selection and implementation of adequate and proportionate security controls such as policies, procedures and technical functions
  • Develop and deliver a security awareness program to your staff
  • Provide advice and guidance on the creation of a ‘security culture’ within your business
  • Once all the requirements of ISO/IEC 27001:2013 have been met, conduct an independent audit against the standard and document the findings in a formal report. Provide a certificate of compliance

ISO/IEC 27001:2013 consultancy services include:

  • Gap Analysis
  • Risk Assessment Risk Remediation/Treatment Plans
  • Statement of Applicability (SOA)
  • Policy Development
  • Awareness Training
  • Management Presentations
  • Pre-certification Audits to ISO/IEC 27001:2013.

Our consultants are qualified ISO/IEC 27001:2013 Lead Auditors with many years experience of delivering information security services. We can help your organisation to comply with the requirements of ISO/IEC 27001:2013 or achieve formal certification against the standard

GET
IN TOUCH

Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.

CONNECT
WITH US

Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

Looking forward to exhibiting at the Emergency Services Show this week. #ESS2018
Cyber security firm offers free GDPR seminars | GBCCBirmingham-based data protection and cyber security specialists… https://t.co/BtNQx4ORts
Virtual Data Protection Officer https://t.co/Lp0sA0A0uT

Subscribe to our Newsletter

Latest Blog Posts

  • Virtual Data Protection Officer

    The GDPR introduces a duty for you to appoint a data protection officer (DPO) if you are a public authority, or if you carry out certain types of processing activities. To support your on going GDPR compliance and management requirements, we can provide a Virtual Data Protection Officer (vDPO) service giving you access to independent […]

    Written on Thursday, 10 May 2018
  • Protecting Businesses with Cyber Essentials

    The lack of basic cyber security controls remains a significant factor in the vast majority of cyber attacks in the UK today. Businesses are left worried about hackers, data loss and security, and are not sure where to turn. The scale of the threat is nothing new.  The media now regularly covering stories of data […]

    Written on Monday, 05 March 2018
  • Are Phishing Emails still a problem?

    There is so much technology and software available these days, preventing malware and malicious emails from getting into our systems that you have to ask are phishing emails still a problem? One of the most used communication technologies is still email due to its versatility and ease of use. However, because of this we now […]

    Written on Friday, 02 March 2018