What is the ISO 27001 Standard?

What is the ISO 27001 Standard?

The ISO 27001 Standard (ISO/IEC 27001:2005) is the international standard describing best practice for an Information Security Management System. The ISO 27001 Information Security Management standard can be applied to all types of organisations and specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System (ISMS) within […]

What is 5G?

What is 5G?

5G is the next step in the evolution of mobile technology and mobile enterprise. It is the fifth generation of mobile networks which comes after the current 4G rollout. We don’t yet know how 5G will work or how fast it will be. But developed countries around the world are looking at their digital policies […]

Rise of IT Consumerisation and BYOD

Rise of IT Consumerisation and BYOD

In 2012 former MI5 boss Stella Rimington lost her laptop at Heathrow Airport. The incident highlighted why it is important for employers to have policies and procedures in place regarding how confidential information is dealt with by their employees. The Salvation Army has embraced the challenge of implementing a BYOD (Bring Your Own Device) strategy amongst its 4,000 employees. The […]

PRINCE2 – Projects in Controlled Environments – A standard for IT projects

PRINCE2 – Projects in Controlled Environments – A standard for IT projects

PRINCE2 is a de facto standard developed and used extensively by the UK government and is widely recognised and used in the private sector, both in the UK and internationally. It embodies established and proven best practice in project management.  PRINCE2 (Projects in a Controlled Environment) is a structured project management method based on experience drawn from thousands […]