Monthly Archive September 2018

Why get ISO27001 certification?

We are sometimes asked the question, why get ISO27001 certification? The answer is that the ISO standard, and ISO 27001 compliance in particular, demonstrates that your organisation takes information security seriously. This ultimately enhances your reputation and delivers greater business opportunities because ISO27001 lowers the risk for other people of doing business with you.

Certification means a third party accredited independent auditor has performed an assessment of all processes and controls and confirms that operations are in alignment with the comprehensive ISO27001 certification standard. If a company is implementing ISO27001, it demonstrates that careful consideration has been given to what could endanger confidentiality, integrity and the availability of information. Once those risks are known, it is about ensuring that security measures have been implemented in order to decrease them to an acceptable level.

Another benefit of this certification is that, unlike GDPR, which does not have an actual compliance process, ISO27001 provides very clear direction. In this way it can be a useful starting point for ongoing adherence to GDPR. ISO27001 concentrates on policies and processes, including all legal, physical and technical controls involved in an organisation’s information risk management processes. Its value is that it creates a robust environment to protect both staff and customer information assets. But of equal value is the fact that it also provides evidence to potential customers and partner organisations that your company prioritises the security of the information it holds.

Of course, undertaking compliance with ISO27001 can be a rather intimidating prospect.  The ISO standards require risk assessments to be conducted, together with the design and implementation of a comprehensive suite of information security controls. It also requires other forms of risk management to address company and architecture security risks on an ongoing basis. This involves the implementation of any necessary changes to policies and processes (ISO27001) and controls (ISO27002). A cost-effective way to negotiate the rigours of the ISO27001 accreditation process is to seek professional help from specialists with proven track record in achieving the standard.

If you are wondering ‘why get ISO27001 certification?’ you should discuss your requirements with us. The SRM team are experienced in all aspects of ISO27001 accreditation. Starting with a gap analysis which establishes a level of security readiness, we can recommend a prioritised remediation plan based on what gaps there are. We are able to assist with any activities that need to be undertaken and provide guidance all the way up to a pre-audit assessment. Finally, our team can offer on-site audit support if needed, to give you complete peace of mind that your organisation’s ISO 27001 accreditation is achieved and maintained.

To discuss ISO27001 or other certifications, contact the SRM team on 03450 21 21 51.

To receive regular blogs on topics relating to information security, follow us on Linkedin.

To find out more visit our website.

Or read more:

The NIS Directive: who does it apply to and what will it mean?

Cyber resilience: it’s a board level issue

Protecting your cyber soul

By Tom Fairfax, Managing Director

If you were asked to sell your soul to a stranger…. what price would you ask?

The ancient Egyptians believed that a person’s soul had multiple parts, ranging from the spiritual to the physical; the bit they hadn’t discovered was the digital component.  Regardless of one’s personal belief, each of us carries a very real and hugely valuable intangible asset in the form of our personal identity and the information that forms part of it.  This asset is incredibly vulnerable in the cyber environment and once compromised is effectively irretrievable.  Think of this as our cyber soul. It contains our very digital essence, our unique identity, our access to our resources and secrets, and represents the means to impersonate us or take control of parts of our life, our possessions or our good name and reputation.

The environment we call cyberspace represents a complex web of connected technology sharing information with and without human interaction.   This environment is inaccessible to our naked senses; we cannot see, hear or feel in it without assistance.  Critically, it is contested, and is populated by a global population of strangers, many of whom are explicitly seeking to compromise us.  It is to this environment that we expose our cyber souls.  The only question is – what protection or consideration do we give our valuable information assets before publishing them into the wild?

We are asked to share parts of our cyber souls on a daily basis.  A myriad of commercial, official and social platforms request and sometimes require information.  Some we hope we can trust – and in some cases we need to make a risk-based decision. But how much thought do you give before deciding what information to share and with whom you entrust this sliver of your essence?  A brief glance at the Information Commissioner’s Office (ICO) enforcement page is instructive and shows that no organisation can be assumed to be safe.  A brief perusal of the causes of breach shows that breaches are not confined to failures of technology but often result from individual and collective human frailty.  This is not new.

This raises another, possibly more important question. How much explicit effort do you spend on protecting the personal information that other people and businesses entrust to you?  The ICO website shows a number of instances where something as seemingly innocent as a breach of email etiquette has resulted in the exposure of personal information, and a direct, if inadvertent compromise of people’s  sensitive information.  Fines and sanctions are damaging, but we must not forget the fundamental breach of trust.

Information Security and data protection are disciplines that enable us to protect our own cyber souls and those with which we have been entrusted by others.  They are still seen by many as an administrative irritation but they are a fundamental part of our personal responsibility as members of society.   No-one can guarantee that they will be 100 per cent safe; indeed such a claim is a good indication that the problem has not been understood.

We can, however, exert a degree of critical judgement on every occasion that we are asked to share parts of our soul.  Trust should not be assumed.

Why the prioritisation of breach identification and containment are crucial elements of every cyber defence strategy

One of the most significant elements of the current cyber threat landscape is the amount of time it takes to actually detect and contain a breach. In a study published last year by IBM security and the Ponemon Institute, the Mean Time to Identify (MTTI) and Mean Time to Contain (MTTC) metrics were used to assess the effectiveness of an organisation’s incident response and containment processes. The research found that it took an average of 168 days to identify a data breach and 67 days to contain it.

The key problem is that in today’s climate few attacks are aimed solely on an organisation’s external defences. This is because, with data security legislation at the strongest it has ever been, external defences like firewalls and network security are usually reasonably robust. So cyber criminals use more subtle tactics, exploiting human error. If an employee opens a malware-laden phishing email or some deceptive social engineering has enabled an attacker to infiltrate malicious codes, the effects may not be evident for some time. This gives malicious attackers the opportunity to explore and exploit the system from within, delivering even more devastating consequences over time.

Given that the current MTTI metrics show that breaches can remain undetected for an average of five and a half months, this provides hackers with ample time to develop their strategy and exploit the weaknesses they detect. So although it will always be necessary to have robust external defences in place, organisations would do well to push the identification of attacks further up the priority list.

The other issue is, of course, containment. The current MTTC metrics show that the average breach, once identified, takes over two months to be contained. The reputational and financial implications of this delay cannot be underestimated.

While building both an external and internal defence is a priority, making detailed plans for how to handle a crisis is equally important. It is perhaps counter-intuitive to plan for a successful attack, but the maxim ‘expect the best but plan for the worst’ is sound advice. Knowing how to react in the unfortunate event of a data breach is a crucial business benefit. An experienced Retained Forensics company will be able to assist you with your plans and help to get everyone into the right mind-set. If the worst does happen, then staff will have a framework to refer to, ensuring that vital steps are taken, and valuable time is not lost.

At SRM, our consultants use their vast expertise to proactively protect systems before an attack occurs. Working with a Retained Forensics specialist facilitates a strategic approach; from analysing potential weaknesses, to making detailed plans in the event of a breach. This is done in a number of ways, including through the process of Test and Exercise, starting with automated penetration testing to identify potential internal vulnerabilities. Manual testing is then employed to exploit and develop these weaknesses, so the gaps can be plugged. The synergy of these tests provides valuable intelligence about where existing vulnerabilities lie, including the human element, and helps a business to build an agile defence around them.

 

To find out more about SRM’s Retained Forensics and Incident Response services contact Mark Nordstrom on 03450 21 21 51 or mark.nordstrom@srm-solutions.com

To receive notification of other blogs relating to issues in the world of information security, follow us on Linkedin.

Or read more from our blog:

Retained Forensic & Incident Response Service: how planning for the worst can add value to your business

Three stages to building a robust defence against external threats

Cyber insurance may be null and void with ‘due care’

Pen testing: seeing both the wood and the trees

SRM Blog

SRM Blog