Skip to main content

Importance of Information Security Professionals - Introduction to CISSP

Posted On:
By: admin

In most businesses and organizations, computers are used as the means to produce, share and store information and also help in managing operations and other business functions. However, the increased rate of cyber-crime, crime involving computer or a network, is creating threat to the global IT industry. With the increasing computer hackers and cyber-terrorists causing threat to information systems, there is a rise in demand for cyber security specialists and information security training.

Personal Information Must be Protected at All Costs

Posted On:
By: admin
In today’s society one can never be too cautious, especially when it comes to protecting sensitive personal or confidential information. With the amount of personal business conducted online and the number of cyber-attacks that are committed daily people need to be extra vigilant about protecting their personal information. This also includes any sensitive information that is accessible in a business setting as well.

Differences between ISO 27001:2005 and ISO 27001:2013

Posted On:
By: admin

There are few differences if organizations are looking towards upgrading to ISMS 27001:2013 version. * The Risk Assessment is provided with a new dimension wherein Risk based approach for Information Security Processes are taken into consideration. * Although directly the Asset based risk approach is not totally ignored the standard still requires that all the inventory of assets is kept and maintained up to date * the other differences is seen in the Annexure controls. SOme controls are merged, some are deleted and some are updated. Now its seen as 114 controls.

hello

Posted On:
By: admin

hello

DEADLY DUST

Posted On:
By: admin

Breathing, a process of taking air and expelling it from the lungs. They say that when we are resting, we breathe 12-20 times a minute. And it is estimated that we take between 17,000-30,000 breaths per day. There comes the risk for people who are working in an environment that are exposed to Respirable Crystalline Silica (RCS) dust, every breath that these people are taking has the potential to cause silicosis-- sounds terrifying right??

 

 

It is time to get CISSP certified!

Posted On:
By: admin

From the Gulf news on September 14, 2016, it reports that UAE target of 5 percent of global cyber-attacks and it is also reporting there is 500% of increase in online crimes in five years. Please see http://gulfnews.com/news/uae/crime/uae-a-target-of-5-per-cent-of-global-cyber-attacks-1.1826610 for more information. As these report tells it is time to evaluate how much we should be ready to safeguard our confidential information from reaching unauthorized person.

 

ISO 9001:2015 Auditing in Reference to the High Level Structure

Posted On:
By: admin

Almost one year has passed since the publication of the 5th edition of ISO 9001:2015 standard. The new version was published September 23, 2015 and has adopted the high level structure (based on Annex SL). This high level structure is a set of 10 clauses that all ISO management system standards are required to use.

Health and Safety... It Matters!

Posted On:
By: admin

Health and Safety is about attitude and it is everyone’s responsibility. Definitely true!

Therefore, human loss and suffering is immeasurable.

Great Marketing

Posted On:
By: admin

Being a Business Development Executive, it is our role to boost sales. I can say this role as compared to human anatomy is the Skeletal System which is the "framework of the body". It is the framework that supports the organization/company to keep on going.

إنبيز إنفوسول والريادة في امن المعلومات...

Posted On:
By: admin

 

تعتبر إنبيز إنفوسول لإستشارات المعلومات ذ.م.م هي شركة رائدة في السوق في مجال استشارات أمن المعلومات وتطبيق المعايير العالمية والمحلية المتعلقة بذلك، وذلك في جميع أنحاء دولة الإمارات العربية المتحدة ودول مجلس التعاون الخليجي، حيث ساعدت خبراء الأمن في العديد من المؤسسات مثل الطيران، البنوك والمؤسسات المالية، الشركات، قطاعات النفط والغاز، الجامعات، المستشفيات وصناعات التجزئة ... الخ، من خلال تصميم منتجات أمن المعلومات الفعالة لأعمالهم ومن ثم تطبيقها ونقل المعرفة لهم، ومن أمثلة تلك الخدمات: