• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

Information Security

DAM Or Web CMS? Part 2: Find Out Which DX Technology You Need For Workflow And Delivery

December 4, 2018 by admin

DAM Or Web CMS? Part 2: Find Out Which DX Technology You Need For Workflow And Delivery

Filed Under: content, DAM, delivery, digital asset management, digital asset management (DAM), digital experience, digital experience platfor, digital transformation, dx, Information Security, IT Security, mark grannan, Nick Barber, Risk Management, tech, video, wcm, web cms, web content management (WCM), workflow

Emphasize Emotion In Your Holiday Customer Service

December 4, 2018 by admin

Emphasize Emotion In Your Holiday Customer Service

Filed Under: customer emotion, customer experience, Customer Experience (CX), customer service, emotion, Holiday 2018, Information Security, IT Security, promoted, Risk Management

Half a billion Marriott guests affected by a large-scale data breach

December 3, 2018 by admin

Half a billion Marriott guests affected by a large-scale data breach

Filed Under: Information Security, IT Security

What Exactly Is Google Apps & How Safe Is It?

March 3, 2017 by admin

Google Apps is a service offered by Google that involves providing independent and customised versions of a number of products with a custom domain name. It includes many Web applications with functions similar to conventional office suites, such as Gmail, Google calendar, G-Talk, Google Groups, Google Sites and Google Docs.
Google Apps can be accessed for free and provides the same storage capacity as any other regular Gmail account. Any enterprise requiring additional storage for e-mail can purchase Google Apps for Business for an annual fee per user account.
[Read more…] about What Exactly Is Google Apps & How Safe Is It?

Filed Under: Application Security, Business Continuity, Compliance And Governance Assessments, Email Security, Enterprise Risk Management, Information Security, Information Security Guideline, IT Security, Security Architecture And Design

Winning at Corporate Security

February 25, 2017 by admin

Winning at Corporate Security

Filed Under: Information Security

Data Loss Prevention (DLP) demand is growing

May 28, 2016 by admin

Data Loss Prevention (DLP) demand is growing

Filed Under: Data Breaches, Data Leakage, Data Leakage Monitoring, Data Loss Prevention, Data Protection, Data Protection Act, Data Protection Policy, Data Security, Information Security