risks

/risks

How ISO 27001 and ISO 27799 complement each other in health organizations

More and more hospitals are interested in protecting their patient information, but they see ISO 27001 as not being specific enough. Although it covers many general aspects about information security, you can integrate it with other standards to cover specific aspects – for example, ISO 27799 for the protection of personal ...

The post How ISO 27001 and ISO 27799 complement each other in health organizations appeared first on 27001Academy.

By | Juni 13th, 2016|Blog, BSI, Information security, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 27799, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, personal health information, Risikomanagement, risks, threats, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How ISO 27001 and ISO 27799 complement each other in health organizations

How ISO 27001 and ISO 27799 complement each other in health organizations

More and more hospitals are interested in protecting their patient information, but they see ISO 27001 as not being specific enough. Although it covers many general aspects about information security, you can integrate it with other standards to cover specific aspects – for example, ISO 27799 for the protection of personal ...

The post How ISO 27001 and ISO 27799 complement each other in health organizations appeared first on 27001Academy.

By | Juni 13th, 2016|Blog, BSI, Information security, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO 27799, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, personal health information, Risikomanagement, risks, threats, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für How ISO 27001 and ISO 27799 complement each other in health organizations

Implementing restrictions on software installation using ISO 27001 control A.12.6.2

Currently, in all companies around the world, it is necessary to install software (operating systems, office applications, financial applications, applications development, etc.). But, in general, the installation of this software is not sufficiently controlled, which can lead to certain risks. ISO 27001:2013 can help these companies with the implementation of an Information ...

The post Implementing restrictions on software installation using ISO 27001 control A.12.6.2 appeared first on 27001Academy.

By | Februar 8th, 2016|A.12.6.2, applications, Blog, BSI, installation, inventory, ISMS, ISMS (BSI, ISO 27001), ISO 27001, ISO27001, Notfallmanagement, Penetrationstest, Penetrationstests, repository, restrictions, restrictions on software installation, Risikomanagement, risks, software, Unternehmen, Veranstaltungen, Zertifizierung & Audit|Kommentare deaktiviert für Implementing restrictions on software installation using ISO 27001 control A.12.6.2