Insights: IT Security

Have you tried to implement a comprehensive information security framework like ISO 27001 or COBIT but nobody is doing what they are supposed to do? A lack of accountability in the workplace is often the main reason.

In the wake of the UK Parliament’s recent network security attack, it’s clear that no matter how well-designed our IT security systems and internal controls are, there’s always a risk of your organization falling victim to a cyber threat.

Headache-causing. Frustrating.  Sluggish.  These are some of the terms that go through our heads when trying to decode the complex regulatory requirements of Sarbanes-Oxley (SOX).

Why do some of your employees get all tasks done on time and as expected, but others can’t seem to have the same success rate, even when those tasks are critical and are designed to avoid, transfer, or reduce risks to the business?
Is it their motivation? Their DNA?  Is it compensation? Is it culture?

In the wake of the UK Parliament’s recent network security attack, it’s clear that no matter how well-designed our IT security systems and internal controls are, there’s always a risk of your organization falling victim to a cyber threat.

Why do some of your employees get all tasks done on time and as expected, but others can’t seem to have the same success rate, even when those tasks are critical and are designed to avoid, transfer, or reduce risks to the business?
Is it their motivation? Their DNA?  Is it compensation? Is it culture?

Deciding to implement a comprehensive information security framework like ISO 27001 or COBIT is not a trivial thing. These frameworks are comprehensive, cross-functional, broad reaching, and culture-changing. Here are 3 compliance software tools to help you through the process.

We dived deep into how companies set up Information Security Management Systems (ISMS) and found 8 key trends that lead to a successful ISO-27001 certification.

Corporations are constantly threatened by information security breaches. Learn how to effectively execute a comprehensive information security strategy.

CommandHound has worked with clients in a variety of industries who deal with sensitive information on a daily basis.