Information Security Management System (ISMS)

Information technology in companies is very complex in parts.

Your company depends on its infrastructure, systems and data storage or, if applicable, outsourcing to the cloud – in accordance with the information security protection objectives of:

  • Confidentiality,
  • integrity and
  • availability

are reliably usable.

You have also understood that there does not have to be a law first to make you aware of the risks associated with the Internet (cybercrime) and you have to take appropriate measures. You know that today it is no longer a question of if, but rather when, your company is exposed to an attack and you can successfully defend against it.

In your area of responsibility, you want an ISMS that is well thought out together with you and that fits your organization, which can significantly minimize your IT risks.

Take advantage of the protection offered by a lean and efficient information security management system (ISMS).

We support you in setting up an ISMS!

As certified ISO/IEC 27001 auditors, we can offer you valuable support in implementing an ISMS.

Are you aiming for ISO/IEC 27001 certification, if applicable?

Since we work as auditors for certification organizations ourselves, we know what is “reasonably” required for certification, but also where a minimum of effort is sufficient.

Below you will find a short overview of the current situation regarding information security and cyber attacks (click on the image).

Source: https://cybermap.kaspersky.com

Here you can find the newest reports of enisa (European Union Agency for Cybersecurity). Click on the image.

Threat Landscape for Supply Chain Attacks (Published July 29, 2021)

“This report aims at mapping and studying the supply chain attacks that were discovered from January 2020 to early July 2021. Based on the trends and patterns observed, supply chain attacks increased in number and sophistication in the year 2020 and this trend is continuing in 2021, posing an increasing risk for organizations. It is estimated that there will be four times more supply chain attacks in 2021 than in 2020. With half of the attacks being attributed to Advanced Persistence Threat (APT) actors, their complexity and resources greatly exceed the more common non-targeted attacks, and, therefore, there is an increasing need for new protective methods that incorporate suppliers in order to guarantee that organizations remain secure.”