ISMS controls

/ISMS controls

How to manage network security according to ISO 27001 A.13.1

As more and more people and organizations become interconnected, more and more information is exchanged, from that considered trivial and disposable to that most sensitive and necessary for people’s lives and business survival. That’s why today’s network infrastructure is so important, and so attractive to wrongdoers. So, to ensure the ...

The post How to manage network security according to ISO 27001 A.13.1 appeared first on 27001Academy.

By | Juni 27th, 2016|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISMS controls, ISO 27001, ISO27001, network security, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to manage network security according to ISO 27001 A.13.1

How to manage network security according to ISO 27001 A.13.1

As more and more people and organizations become interconnected, more and more information is exchanged, from that considered trivial and disposable to that most sensitive and necessary for people’s lives and business survival. That’s why today’s network infrastructure is so important, and so attractive to wrongdoers. So, to ensure the ...

The post How to manage network security according to ISO 27001 A.13.1 appeared first on 27001Academy.

By | Juni 27th, 2016|Blog, BSI, ISMS, ISMS (BSI, ISO 27001), ISMS controls, ISO 27001, ISO27001, network security, Notfallmanagement, Penetrationstest, Penetrationstests, Risikomanagement, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How to manage network security according to ISO 27001 A.13.1