2 Seasons

All Episodes

Vivamus magna justo, lacinia eget consectetur sed, convallis at tellus. Pellentesque in ipsum id orci porta dapibus. Sed porttitor lectus nibh. Curabitur arcu erat, accumsan id imperdiet et, porttitor at sem.

Featured Episode

Becoming an Information Security Champion

CIts a culture change to keep your organisation secure but a champion who can lead from the front is whats needed  . 

Season 2, Episode 4    |    38min

What is a hashed password?

At the point when a secret key has been "hashed" it implies it has been transformed into a mixed portrayal of itself. A client's secret key is taken and – utilising a key known to the site – the hash esteem is gotten from the mix of both the secret key and the key,...

What is Port 7 used for?

What is a Port in IT terms not the famous one in Liverpool England ! Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network...

IS27 Secures G Cloud 12 Supplier Status with Government

PRESS RELEASE – Liverpool 1st October 2020- Intime Services Limited Liverpool, UK, 1st October 2020, (www.is27.co.uk) Intime Services Limited, a global leader in Information security software and solutions have been named as a supplier on HM Crown Commercial Service’s...

What is Personal data?

What is Personal Data? This is a term defined in law. The following types of data are considered ‘personal data’ when they are on your phone, because they are being stored on a phone that is registered to you personally: the postcode district you provide when you...

How do your offload your old customer information?

ISO 27001 and GDPR This right to erasure or right to be forgotten is found in Article 17 of the GDPR. While there are some exceptions — for the completion of a contract, regulatory requirements, legal cases, and the public interest — much of the time a customer from...

How To Get ISO 27001

Define the scope of the ISMS The scope is the wording in which your organisation will confirm the compliance to an audit assessment but also will show your customers/clients that the ISMS is managing. (www.iso.org) This can look like something like this: “The...

How to do a security risk assessment

1. How to control your Risks in Information Security ISO27001 List all the potential risks that may impact your information processing. Once you uncover any risks, you need to analyse how the risk might occur, which may further involve identifying a vulnerability in...

How to deal with a data breach

What must an organisation do when they think they have had a data breach? If a company has lost your personal data as a result of a data breach, the company has data protection procedures it must take.  If there is...

How to do a SWOT analysis SWOT analysis

If you have a ISO standard then maybe the pandemic was not a furloughed reason ! Your SWOT analysis is an opportunity to consider the strengths, weaknesses, opportunities and threats that can help or impact your business. Threats will include some universal...

New Episodes Weekly

Live Every Thursday @ 9am

Want to Be a Guest?

Come Onto the Show

Stay Connected to Get The Latest Podcast Alerts