Home » Posts tagged "information security"
Sep 3

Take Control of Your Company’s Information Security

September 3rd, 2015 by

Online Security Whether your business is large or small, it undoubtedly stores a substantial amount of classified or sensitive information that has to be protected. Your employee records, for example, contain Social Security numbers that could lead to identity theft if they make it into the wrong hands. All of your customers who have ever paid for products or services have left payment information, credit card details or bank account routing numbers, and it is paramount that you secure these to the best of your ability to protect them as well as your company’s reputation.[...] Read More

Aug 25

Manage Your IS Through Security Awareness Training

August 25th, 2015 by

TrainingIn decades past, the issue of security meant ensuring that all the office doors were locked at the end of the day or that everything in the petty cash drawer was accounted for. Today, the landscape of security has changed drastically thanks to the rise of technology. For an IT service company, security means protecting the data entrusted to you by customers as well as employee information and proprietary information owned by the business.[...] Read More

Apr 29

Security Awareness: Strengthening The Weakest Link

April 29th, 2014 by

Security AwarenessYour defense-in-depth information security strategy is defined and implemented. You’ve set up firewalls, honeypots, encryption and antivirus. Your user security is granular, restrictive and multifactor. But no matter how many technology solutions are in place, the human element can always provide an opening for cyber-criminals.[...] Read More

Oct 4

ITIL® – How It Improves Information Security

October 4th, 2013 by

The ITIL® framework provides Information Security guidelines that can affect Information Security personnel both directly and indirectly. The Security Management process guidelines are one way in which ITIL affects Information Security staff directly. Other ITIL guidelines ensure that the IT processes are being aligned with the overall business goals of the organization.[...] Read More

Oct 3

CISSP® Training Develops Employees and Organizations

October 3rd, 2013 by

Organizations seeking to attract and retain top-quality employees should invest in training and education. The CISSP, Certified Information Systems Security Professional, designation is recognized worldwide as indicating an individual has attained expertise in the field of Information Security.[...] Read More

Oct 2

Information Security and ITIL®

October 2nd, 2013 by

The IT Infrastructure Library® or ITIL® is a collection of guidelines and best practices that can create an integrated and efficient IT infrastructure in any company. ITIL implementation has a number of benefits. It can improve the quality of services and service delivery, align IT with overall business goals, and, most importantly, reduce the cost of maintaining the IT infrastructure and IT support. The ITIL framework can also be advantageous to Information Security personnel.[...] Read More

Jun 28

Role of ITIL® in Improving Information Security – Part II

June 28th, 2013 by

Here are a few more ways in which ITIL® can improve your organization’s Information Security.[...] Read More

Jun 26

Role of ITIL® in Improving Information Security – Part I

June 26th, 2013 by

The Information Technology Infrastructure Library® (ITIL®) defines a number of guidelines and practices that can help you in managing your organization’s IT services. The beauty of these policies and guidelines is their generic nature. This implies that you can apply these principles to practically any environment in the IT field and be assured of the results. ITIL is known to be a significant factor in managing Information Security. But you can also leverage its capabilities to improve Information Security. This article will highlight a few ways through which you can do so.[...] Read More

May 7

What Does Information Security Really Mean?

May 7th, 2013 by

Information SecurityDefining Information Security can be difficult, especially for CEOs and upper-level decision makers. While you know that you don’t want the thousands of employee records, customer payment files and sales data you’ve amassed to fall into the hands of hackers, that’s not all you need to worry about.[...] Read More

May 4

CISSP – The Information Security Specialist

May 4th, 2011 by

Networking concept: Cloud With Padlock on digital backgroundThe Certified Information Systems Security Professional (CISSP) is an independent Information Security certification.  This credential is governed by the nonprofit organization International Information Systems Security Certification Consortium, commonly known as (ISC)2. The CISSP Certification was the first credential in the field of Information Security to be accredited by ANSI (American National Standards Institute) to ISO (International Organization for Standardization) Standard 17024:2003. The CISSP Certificate is more than just an objective measure of brilliance and security specialization; it is a globally accepted standard of achievement. With over 64,000 CISSPs worldwide, the CISSP Certificate is a jewel in any Information Security practitioner’s crown.[...] Read More

Comments Off on CISSP – The Information Security Specialist