by IS27 | Aug 14, 2021 | Cloud
What is a hashed password? At the point when a secret key has been “hashed” it implies it has been transformed into a mixed portrayal of itself. A client’s secret key is taken and – utilising a key known to the site – the hash esteem is gotten from...
by IS27 | Jan 26, 2021 | Cloud
What is a Port in IT terms not the famous one in Liverpool England ! Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for...
by IS27 | Oct 10, 2020 | Cloud
PRESS RELEASE – Liverpool 1st October 2020- Intime Services Limited Liverpool, UK, 1st October 2020, (www.is27.co.uk) Intime Services Limited, a global leader in Information security software and solutions have been named as a supplier on HM Crown Commercial Service’s...
by IS27 | Oct 4, 2020 | Cloud
What is Personal Data? This is a term defined in law. The following types of data are considered ‘personal data’ when they are on your phone, because they are being stored on a phone that is registered to you personally: the postcode district you provide when you...
by IS27 | Oct 4, 2020 | Cloud
ISO 27001 and GDPR This right to erasure or right to be forgotten is found in Article 17 of the GDPR. While there are some exceptions — for the completion of a contract, regulatory requirements, legal cases, and the public interest — much of the time a customer from...
by IS27 | Aug 28, 2020 | How to
Define the scope of the ISMS The scope is the wording in which your organisation will confirm the compliance to an audit assessment but also will show your customers/clients that the ISMS is managing. (www.iso.org) This can look like something like this: “The...
by IS27 | Aug 26, 2020 | Cloud
1. How to control your Risks in Information Security ISO27001 List all the potential risks that may impact your information processing. Once you uncover any risks, you need to analyse how the risk might occur, which may further involve identifying a vulnerability in...
by IS27 | Jun 17, 2020 | Cloud
What must an organisation do when they think they have had a data breach? If a company has lost your personal data as a result of a data breach, the company has data protection procedures it must take. If there is a serious breach of your personal data...
by IS27 | Jun 16, 2020 | How to
If you have a ISO standard then maybe the pandemic was not a furloughed reason ! Your SWOT analysis is an opportunity to consider the strengths, weaknesses, opportunities and threats that can help or impact your business. Threats will include some universal...
by IS27 | Jun 16, 2020 | News
Those customers with annual assessments due prior to 1st October 2020 are encouraged to contact their Assessment Manager to begin discussions about the best way to conduct their assessment remotely. To reduce risks associated with conducting on-site assessments, the...
Recent Comments