by Alex Cruden (TTL) | 14 Oct 2022 | Security Risk Compliance
Cyber Smart Week 2022 Overview The world of cyber security is fast-moving and complex. Online threats and scams like phishing, virus, ransomware, etc can impact anyone. As the time we’re spending online increases, so do the security risks. CERT NZ is the New Zealand...
by Alex Cruden (TTL) | 15 Mar 2022 | Security Risk Compliance
Final Thoughts Recap We’ve covered a lot of ground since this series of security articles was first posted. Here’s a reminder of the main topics we’ve explored: Information Security Management System and How to Start Framework Focus Organisation Management Asset...
by Alex Cruden (TTL) | 8 Mar 2022 | Security Risk Compliance
BCP and DRP Requirements In business, BCP and DRP are essential to help deal with unexpected situations. This is because they can cause interruption or degradation of operational company functions. The best case scenario is that they cause nothing more than a minor...
by Alex Cruden (TTL) | 1 Mar 2022 | Security Risk Compliance
Third Party Relationships Requirements Most companies have relationships with third parties, such as suppliers and service providers, to perform functions that support the core activities of the company. These relationships will generally involve sharing information...
by Alex Cruden (TTL) | 22 Feb 2022 | Security Risk Compliance
Human Resource Management Requirements People play a major role in the implementation of security driven procedures and processes. It is critical that the management of that organisation’s human resource is aware of obligations in relation to security. Each of the...
by Alex Cruden (TTL) | 15 Feb 2022 | Security Risk Compliance
Software Development Requirements The practice of developing application software can be described as a process that results in a type of computer program that performs a specific function. Generally speaking, each program is designed to assist the end user(s) with a...
by Alex Cruden (TTL) | 8 Feb 2022 | Security Risk Compliance
ICT Operational Management Requirements The operational functions performed by an ICT team are part of a large body of processes and procedures relating to how technology services are delivered to the organisation. Many ICT teams choose to align with a recognised...
by Alex Cruden (TTL) | 1 Feb 2022 | Security Risk Compliance
Use of ICT Systems Requirements A company’s technology asset comprises systems and components used to provide services to the end users of that technology. Typically, this includes a mixture of hardware and software components. For example: back-end servers, storage,...
Recent Comments