{"id":695,"date":"2014-04-23T12:49:52","date_gmt":"2014-04-23T11:49:52","guid":{"rendered":"http:\/\/kz-a.net\/kza\/?page_id=695"},"modified":"2020-02-10T16:41:57","modified_gmt":"2020-02-10T16:41:57","slug":"information-security","status":"publish","type":"page","link":"https:\/\/kz-a.net\/kza\/index.php\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<p><strong>Your Data is Valuable, That&#8217;s Why Criminals Want to Steal It!<\/strong><\/p>\n<p>We live in a world where internet enabled cyber-attacks are\u00a0one of the fastest growing phenomena on the planet. \u00a0At the extreme end this spectrum are cyber-warfare and cyber-terrorism, but for most organisations the biggest threat is from cyber-crime.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft wp-image-707 size-full\" title=\"cyber-crime\" src=\"http:\/\/kz-a.net\/kza\/wp-content\/uploads\/bg-password.jpg\" alt=\"bg-password\" width=\"300\" height=\"162\" \/><\/p>\n<p>You can of course protect yourself by unplugging from the world wide web and avoiding the use of computers, but today that is not a credible option for almost anyone. So what is the alternative?<\/p>\n<p><strong>ISO 27000<\/strong><\/p>\n<p>The ISO 27000 family of standards helps organisations keep their valuable and sensitive information assets safe and secure.<\/p>\n<p>Using this family of standards will help your organisation manage the security of assets such as financial information, intellectual property, employee details, or information entrusted to you by third parties. In doing so it can help you win new business, keep existing business, avoid financial loss and expensive litigation, and protect your hard-won reputation.<\/p>\n<p>It is also an effective means of demonstrating compliance with many of the large and growing body of legal, regulatory and contractual compliance requirements organisations are increasingly obliged to adhere to today.<\/p>\n<p>ISO\/IEC 27001 is the best-known standard in the information security (InfoSec) family providing requirements for an information security management system (ISMS).<\/p>\n<p><strong>What is an ISMS?<\/strong><\/p>\n<p>An ISMS is a systematic approach to managing the sensitive information in your organisation so that it remains secure. It includes people, processes and technology (e.g. IT systems) and works by applying a risk management process.<br \/>\n<img loading=\"lazy\" class=\"size-full wp-image-727 alignright\" src=\"http:\/\/kz-a.net\/kza\/wp-content\/uploads\/bg-cybersafe.jpg\" alt=\"cyber-secure\" width=\"300\" height=\"188\" \/><\/p>\n<p>It can help small, medium and large businesses in any sector keep information assets secure.<\/p>\n<p><strong>Certification<\/strong><\/p>\n<p>Like other ISO management system standards, certification to ISO\/IEC 27001 is advisable and beneficial but not obligatory. Some organisations choose to implement the standard in order to benefit from the good practices it contains while others decide they also want to get certified to reassure customers and clients that its recommendations have been followed and that their data is protected, as validated by an independent body.<\/p>\n<p><strong>Why KzA?<\/strong><\/p>\n<p>At KzA, as a certified ISMS Lead Auditor, we have the expertise to help you successfully implement your ISMS and support you in your internal audits of its performance, ensuring it is ready, should you so choose, to be formally certified by an independent, United Kingdom Accreditation Service (UKAS)\u00a0approved, ISO certifying body.<\/p>\n<p>As KzA provides general <a title=\"Consulting Services\" href=\"https:\/\/kz-a.net\/kza\/index.php\/services\/\">consultancy services<\/a>, in addition to ISMS specific implementation assistance, we will also help you ensure that your ISMS will fit into the context of your organisation and not come across as an after-thought add-on. \u00a0As in the case of our other services, we use our &#8216;fast-track&#8217;\u00a0<a title=\"Target Operating Model\" href=\"https:\/\/kz-a.net\/kza\/index.php\/fast-track-operating-model\/\">Target Operating Model (TOM)<\/a>, with its extensive set of pre-fabricated materials, to accelerate and integrate the implementation of your ISMS.<\/p>\n<p>Want to know more? Then\u00a0<a title=\"Contact Us\" href=\"https:\/\/kz-a.net\/kza\/index.php\/contact\/\">Contact Us<\/a>\u00a0now for a free, confidential, no-obligation conversation about how we can help your organisation secure its valuable information assets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your Data is Valuable, That&#8217;s Why Criminals Want to Steal It! We live in a world where internet enabled cyber-attacks are\u00a0one of the fastest growing phenomena on the planet. \u00a0At the extreme end this spectrum are cyber-warfare and cyber-terrorism, but for most organisations the biggest threat is from cyber-crime. You can of course protect yourself [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/pages\/695"}],"collection":[{"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/comments?post=695"}],"version-history":[{"count":37,"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/pages\/695\/revisions"}],"predecessor-version":[{"id":1010,"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/pages\/695\/revisions\/1010"}],"wp:attachment":[{"href":"https:\/\/kz-a.net\/kza\/index.php\/wp-json\/wp\/v2\/media?parent=695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}