Information security guidelines
According to ISO27001, an information security policy is a specification document that companies use to regulate their information security.
Information security guidelines Read More »
Many companies can use the new technologies to increase their sales and reduce costs at the same time. The contribution to corporate value creation increases. Here we offer insights for entrepreneurs and managing directors so that they can see how they can scale sales sustainably with the help of the new platforms.
If you want to successfully enter the market, you need the right marketing strategy and complementary technologies. Stable growth no longer works with the methods of the 1960s. Key terms like VOIP, VIP jets, cloud, sales management, lead nurturing and digital compliance become a problem. All of these terms have something in common with each other. They are part of the strategic puzzle of the new unicorns.
Use the articles provided here as well as our podcast on Spotify to brainstorm ideas.
According to ISO27001, an information security policy is a specification document that companies use to regulate their information security.
Information security guidelines Read More »
Why do you need an internal audit for the QMS or ISMS? An internal audit is required for compliance with the applicable standard (e.g. ISO 9001, ISO 27001). The effectiveness of the management system must be reliably guaranteed. This internal audit of individual processes and systems follows a previously established schedule and guidelines. The results
What is an IT assessor? An IT appraiser is an expert in systems, information processing applications and software development. He is also often referred to as an IT expert. On the one hand, there are appointed and sworn experts who are commissioned by courts to examine a factual situation at the expense of the parties
What and why is supplier management important for ISO 27001? The ISO 27001 standard expects companies to carry out a variety of activities to ensure information security. Supplier management requires organizations to carefully select their suppliers and continually monitor their reliability. Therefore, in our ISMS, our supplier management must provide evidence of the following activities:
Supplier Management Read More »
What are deviations according to the ISO standard? As a rule, the term “non-conformity” can be found in the specialist literature. For better understanding, the term deviation is often used in colloquial language. All ISO standards refer to deviations as the situation of an “unmet requirement”. In the ISO 9001 standard there is chapter “3.6.9
What exactly is a deviation? Read More »
Security goals are an important part of an ISMS according to ISO 27001. Find out how to document these measurable goals and objectives
What are security objectives according to ISO 27001? Read More »