{"id":5402,"date":"2021-09-07T11:05:22","date_gmt":"2021-09-07T11:05:22","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5402"},"modified":"2021-09-07T11:09:36","modified_gmt":"2021-09-07T11:09:36","slug":"information-security-framework-iso-27001","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5402","title":{"rendered":"INFORMATION SECURITY FRAMEWORK (ISO 27001)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5402\" class=\"elementor elementor-5402\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b335449 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b335449\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-052fadd ot-flex-column-vertical\" data-id=\"052fadd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21672793 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21672793\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f11af0 ot-flex-column-vertical\" data-id=\"6f11af0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c9284d elementor-widget elementor-widget-iserv_box\" data-id=\"50c9284d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-unlock-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Helping build your security strategy<\/h5>\r\n\t            <div>To be truly secure, enterprise wide, you need the right strategy. This is where an information security framework will help your business:<br>\n<br>\nManage and protect information in a consistent and cohesive way <br>\nShowcase management commitment to protect your brand from cyber threats <br>\nImprove the effectiveness and efficiency of your security controls<br>\n<br>\nHaving a compliant framework also ensures that information security requirements are aligned with business goals and objectives, and that security is everyone\u2019s responsibility.\n\nTo help you, we follow requirements identified by ISO 27001 standard that assist to establish and implement an information security framework.<\/div>\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38537f8 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38537f8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5a0ded92 ot-flex-column-vertical\" data-id=\"5a0ded92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b17eeff elementor-widget elementor-widget-image\" data-id=\"b17eeff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"444\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dt2-768x444-1.png\" class=\"attachment-large size-large wp-image-2152\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dt2-768x444-1.png 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dt2-768x444-1-300x173.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dt2-768x444-1-720x416.png 720w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-062dd9c ot-flex-column-vertical\" data-id=\"062dd9c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4fa6c9f elementor-widget elementor-widget-text-editor\" data-id=\"4fa6c9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Our Approach<\/strong><\/h4><p>We evaluate the following:<\/p><ul><li>That there is leadership support and commitment to information security<\/li><li>That an information security risk management process is formalized, well-communicated and is aligned with the business risk profile<\/li><li>That information security controls are documented, evolved and are continuously monitored and improved upon<\/li><li>That security policies and standards are formalized, reflecting the environment, and communicated with relevant employees<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Helping build your security strategy To be truly secure, enterprise wide, you need the right strategy. This is where an information security framework will help your business: Manage and protect information in a consistent and cohesive way Showcase management commitment to protect your brand from cyber threats Improve the effectiveness and efficiency of your security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5402","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5402"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5402\/revisions"}],"predecessor-version":[{"id":5409,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5402\/revisions\/5409"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}