Blog
The latest insights and guides about ISO, ISO Management and our ISOPlanner Software.

7 Tips for creating an authorization matrix
An authorization matrix is an important tool within organizations to manage access rights to systems and sensitive data. It provides insight into who has what rights and ensures that only authorized individuals have access to relevant information. In this article, we...

Clean Desk Policy and Clear Screen Policy and information security
When it comes to information security, there are several measures an organization can take to ensure that sensitive information remains secure. Two of these measures are the Clean Desk Policy and the Clear Screen Policy. In this article, we will take a closer look at...

What is a Statement of Applicability?
A statement of applicability (SoA) is a document used to establish the relevance and degree of compliance with certain norms and standards within an organization. It is often prepared as part of certification processes, such as ISO certifications. How does it differ...

What are the benefits of ISMS software?
In today's digital world, ensuring information security is vital for organizations. The loss or theft of sensitive information can have serious consequences, including reputational damage, financial loss, and legal liability. To minimize these risks, more and more...

Benefits of ISO 27001 for cloud service companies
In these modern times when businesses and organizations depend on technology, information security is essential. Cloud service companies deal with large amounts of sensitive information stored in the cloud. It is therefore important that they ensure that this...

Tips on asset risk management through ISO 27001
ISO 27001 is a standard that deals with information security. The premise of this standard is that an organization must establish an information security management system (ISMS). That management system must ensure that information security is adequate and...

Security Island: what is it and how to prevent it?
You've probably heard of the term security island. But what exactly is it? And is it a desirable or undesirable situation? In this article, we address these questions so you can better understand what a security island is and how to deal with it. What is a security...

ISO 27001 Certification: Step-By-Step Guide
Implementing the ISO 27001 standard is not a one-off project. It is the start of a process of continuous improvement. Strangely enough, this process can become more and more fun. As an organization you are developing more and more clarity, you are scrapping and...

Tips for creating information security policies
Information security is one of the most important components of any business in our current digital age. To ensure that information remains secure, companies must implement appropriate policies and procedures. These information security policies must protect...

What does an ISO certification auditor do?
ISO certification is a voluntary process by which organizations can demonstrate their commitment to quality and safety standards. The International Organization for Standardization (ISO) is a global governing body that sets standards among other quality,...
Sign Up For Our Newsletter
Join over 1.000 ISO professionals for the latest ISO insights
See ISOPlanner in action
Book a live demo or start your free trial.