{"id":5384,"date":"2021-09-07T10:50:38","date_gmt":"2021-09-07T10:50:38","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5384"},"modified":"2021-09-07T10:51:21","modified_gmt":"2021-09-07T10:51:21","slug":"information-security-audit","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5384","title":{"rendered":"Information Security Audit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5384\" class=\"elementor elementor-5384\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-67244851 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67244851\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-19e69e89 ot-flex-column-vertical\" data-id=\"19e69e89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22900c9c elementor-widget elementor-widget-iheading\" data-id=\"22900c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ INFORMATION SECURITY AUDIT<\/span>\r\n\t        <h2 class=\"main-heading\">Align your Information Security To Current Standards and Protocols<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4943b7aa elementor-widget elementor-widget-text-editor\" data-id=\"4943b7aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To minimize business and reputational risk, it\u2019s important that your current procedures, controls and processes within the Information Security Management System (ISMS) are in line with security standards, regulations and your organization\u2019s policies. The ISMS should also be effectively implemented and maintained.<\/p><p>This is where performing regular audits at planned intervals will identify whether information security controls:<\/p><ul><li>Meet your organization\u2019s context and risks regarding information security.<\/li><li>Are effectively implemented and maintained.<\/li><li>Are defined using a risk-based approach, and updated policies and standards exist, and have been communicated to employees and external parties.<\/li><\/ul><h4>Our Approach<\/h4><p>We evaluate the following:<\/p><ul><li>There is leadership support and commitment to information security.<\/li><li>Information security risk management process is formalized, well communicated and aligned with the business risk profile.<\/li><li>Information security controls are documented, evolved and continuously monitored and improved.<\/li><li>Security policies and standards are formalized, reflecting the environment.<\/li><li>Security policies and standards are\u00a0communicated with employees.<\/li><\/ul><h4>Our Promise of Value<\/h4><ul><li>Seasoned and business-minded security consultants with over 10 years of experience.<\/li><li>Well-versed with legislative and regulatory frameworks in addition to industry-leading standards.<\/li><li>Commitment to collaborating closely with clients on security solutions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-115f6801 ot-column-items-top ot-flex-column-vertical\" data-id=\"115f6801\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-865bb70 elementor-widget elementor-widget-image\" data-id=\"865bb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"569\" height=\"516\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/penetration-testing-information-security-services-vector-min-1.png\" class=\"attachment-large size-large wp-image-2122\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/penetration-testing-information-security-services-vector-min-1.png 569w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/penetration-testing-information-security-services-vector-min-1-300x272.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ INFORMATION SECURITY AUDIT Align your Information Security To Current Standards and Protocols To minimize business and reputational risk, it\u2019s important that your current procedures, controls and processes within the Information Security Management System (ISMS) are in line with security standards, regulations and your organization\u2019s policies. The ISMS should also be effectively implemented and maintained. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5384","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5384"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5384\/revisions"}],"predecessor-version":[{"id":5388,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5384\/revisions\/5388"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}