Uncategorized

Disaster Recovery Business Continuity: Is there a copy of your business continuity plan that you can easily retrieve?

With so many factors to consider in the creation of your business recovery plans, navigating it all can be a challenge, akin requirements vary among industry sectors, affecting the development, focus and execution of business continuity plans. Also, now that you have a bit of a working understanding of what backup is, you can begin…

Uncategorized

ISO 27005: What is the risk that decisions of management are negatively influenced as a result of the incident affecting information integrity?

With the rapid growth of online information services, risk plays an important part in the new version of the standard, and it has clear clauses to determine risks and take actions. Situational Management Thus even though the probability of a particular risk may be low, if the consequence is high, the risk must be either…

Uncategorized

ISO 27005: What is the risk that the breach of confidentiality of information by the incident negatively affects employee morale and/or motivation?

The availability of information and technology system is also needed when a disaster or other incident occurs, risk should be thought of in terms of what, and how, losses (or gains) may affect your organization through a wide range of sources, also, management, in turn, is responsible for the day-to-day management of risk and implementation…

Uncategorized

GDPR Compliance: Do you have to tell other organizations about the erasure of personal data?

Your preparation for GDPR should have also included identifying any data processors or other organizations with whom you share personal data, organizations involved in high-risk processing activities will have to be required to appoint a data protection officer. Of course, all organizations and organizations that work with personal data should appoint a data protection officer…

Uncategorized

COBIT: How do other organizations use ITIL?

And as for ITIL processes, selected COBIT control objectives can be interpreted and meaningfully applied to system and software security, as some organizations and organizations continue to struggle to find the value of IT investments in their long-term strategic plans, use cobit to help design service contracts by identifying deliverables and responsibilities. Best Risk Akin…