What is ISO 27001?
The ISO 27001:2013 (also known as BS EN 27001:2017) standard provides a framework for an Information Security Management Systems (ISMS) that enables the continued confidentiality, integrity and availability of information as well as legal compliance. ISO 27001 certification is essential for protecting your most vital assets.
ISO 27001 implementation is an ideal response to customer and legal requirements such as the GDPR and potential security threats including:
- Cyber crime
- Personal data breaches
- Vandalism / terrorism
- Fire / damage
- Viral attack
The ISO 27001 standard is also structured to be compatible with other management systems standards, such as ISO 9001 and it is technology and vendor neutral, which means it is completely independent of any IT platform. As such, all members of the company should be educated on what the standard means and how it applies throughout the organization.
How To Get Certified To ISO 27001
Helps you with
- Asset protection
- Security policy
- Cyber security strategy
- IT governance
- Incident management
- Threat mitigation
- Downtime reduction
- Loss prevention
- Data breaches
- Compliance checklist
- Management system
Other risk management standards:
Benefits of ISO 27001 Certification
Give customers confidence that their personal data/information is protected and confidentiality upheld at all times.
Is ISO 27001 certification right for me?
ISO 27001 certification is right for you and your organization if you need the evidence or assurance that your most important asset is protected from misuse, corruption or loss. If you're looking for a way to secure confidential information, comply with industry regulations, exchange information safely or manage and minimize risk exposure, ISO 27001 certification is a great solution.
We have certified organizations to ISO 27001 in a diverse range of sectors, including Royal Mail Group, Smart Water Technology, Barcode Warehouse and the Northern Ireland Council for Curriculum, Examinations and Assessment. ISO 27001 is suitable for many industries, including government agencies, financial and IT companies, telecoms and any other organization that works with sensitive data.
What is an ISMS?
An Information Security Management System (ISMS) is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process to help organizations of any size, within any industry, keep business information assets secure.
With the increasing severity of data breaches in today's digitized world, ISMS is crucial in building up your organization's cyber security. Some benefits of ISMS include:
- Increased attack resilience: ISMS improves your ability to prepare for, respond to and recover from any cyber attack.
- Manage all of your data in one place: As the central framework for your organization's information, ISMS allows you to manage everything in one place.
- Easily secure any form of information: Whether you want to protect paper-based, cloud-based or digital info, ISMS can handle every kind of data.
- Reduce the costs of information security: With the risk assessment and prevention approach provided by ISMS, your organization can reduce the costs of adding layers of defensive technology after a cyber attack that aren't guaranteed to work.
GDPR and ISO 27001
The General Data Protection Regulation (GDPR) has a much more extensive scope than the previous Data Protection Act (DPA) and has been introduced to stay in touch with the modern digital landscape. The Regulation affords more data rights to individuals and requires organizations to develop defined policies, procedures and to adopt relevant technical and organizational controls to protect personal data.
The GDPR applies to two types of users, of which we will undoubtedly all fall; Controllers and Processors. Briefly put; the controller determines how and why the personal data is used or processed and the processor acts on the controllers behalf, much like many organizations relying on the services of an IT service provider. Processors have more legal obligations placed on them in the case of a breach however a controller will be responsible for ensuring the contracts with the processor comply with the GDPR.
This is not a complete overview of the regulation and should not be used as such. Find out the key points and how they map to ISO 27001 here.
Steps to Certification
Complete a Quote Request Form so that we can understand your company and requirements. You can do this by completing either the online quick quote or the online formal quote request form. We will use this information to accurately define your scope of assessment and provide you with a proposal for certification.
Once you’ve agreed your proposal, we will contact you to book your assessment with an NQA Assessor. This assessment consists of two mandatory visits that form the Initial Certification Audit. Please note that you must be able to demonstrate that your management system has been fully operational for a minimum of three months and has been subject to a management review and full cycle of internal audits.
Following a successful two stage audit, a certification decision is made and if positive, then certification to the required standard is issued by NQA. You will receive both a hard and soft copy of the certificate. Certification is valid for three years and is maintained through a programme of annual surveillance audits and a three yearly recertification audit.
Information Security Toolkit
Need a Consultant?
ISO 27001 Implementation Guide
Download Certification Logos
ISO 9001 to ISO 27001 Gap Guide
ISO 27701 Implementation Guide