top of page



Control 8.14: Redundancy of Information Processing Facilities - Ensuring Uninterrupted Operations
In the digital realm, continuity is king. Control 8.14, "Redundancy of Information Processing Facilities," stands as a fortress against...

Nick Beaugeard
Nov 17, 20232 min read
2 views
0 comments


Control 8.13: Information Backup - Ensuring Resilience
In the ever-changing digital landscape, disruptions are inevitable, but the loss of critical data doesn't have to be. Control 8.13,...

Nick Beaugeard
Nov 16, 20232 min read
2 views
0 comments


Control 8.12: Data Leakage Prevention - Safeguarding Information Flow
In the interconnected world of digital information, keeping sensitive data within the right boundaries is paramount. Control 8.12, "Data...

Nick Beaugeard
Nov 15, 20232 min read
1 view
0 comments


Control 8.11: Data Masking - Balancing Accessibility and Privacy
In a digital world, data is a valuable resource, but with great value comes great responsibility. Control 8.11, "Data Masking," tackles...

Nick Beaugeard
Nov 14, 20232 min read
3 views
0 comments


Control 8.10: Information Deletion - Erasing Digital Footprints
In the age of information, what's no longer needed can be just as important as what is. Control 8.10, "Information Deletion," focuses on...

Nick Beaugeard
Nov 13, 20232 min read
3 views
0 comments


Control 8.9: Configuration Management - Orchestrating Digital Harmony
In the symphony of information systems, configuration management serves as the conductor, ensuring every component plays its part...

Nick Beaugeard
Nov 10, 20232 min read
3 views
0 comments


Control 8.8: Management of Technical Vulnerabilities - Fortifying Digital Defenses
In the realm of information security, staying ahead of potential vulnerabilities is akin to strengthening the walls of a fortress....

Nick Beaugeard
Nov 9, 20232 min read
2 views
0 comments


Control 8.7: Protection Against Malware - Safeguarding the Digital Ecosystem
Digital threats can lurk in the shadows, ready to infiltrate and disrupt. Control 8.7, "Protection Against Malware," acts as a shield...

Nick Beaugeard
Nov 8, 20232 min read
1 view
0 comments


Control 8.6: Capacity Management - Optimising Digital Resources
Efficient resource utilization is akin to orchestrating a symphony. Control 8.6, "Capacity Management," takes centre stage in this...

Nick Beaugeard
Nov 7, 20232 min read
2 views
0 comments


Control 8.5: Secure Authentication - Unlocking Digital Doors Safely
Authentication serves as the key to unlock digital doors and access critical resources. Control 8.5, "Secure Authentication," plays a...

Nick Beaugeard
Nov 6, 20232 min read
2 views
0 comments


Control 8.4: Access to Source Code - Safeguarding the Blueprint of Innovation
In the world of software development, source code is the blueprint that underpins innovation, functionality, and security. Control 8.4,...

Nick Beaugeard
Nov 3, 20232 min read
1 view
0 comments


Control 8.3: Information Access Restriction - Safeguarding the Digital Vaults
Controlling who can access what is akin to guarding a vault of valuable treasures. Control 8.3, "Information Access Restriction," plays a...

Nick Beaugeard
Nov 2, 20232 min read
1 view
0 comments


Control 8.2: Privileged Access Rights - Fortifying Digital Boundaries
In the intricate world of information security, privileged access rights act as the keys to the kingdom. Control 8.2, "Privileged Access...

Nick Beaugeard
Nov 1, 20232 min read
1 view
0 comments


Control 8.1: User End Point Devices - Safeguarding Digital Frontiers
User end point devices act as the frontiers connecting individuals to information, applications, and networks. Control 8.1, "User End...

Nick Beaugeard
Oct 31, 20232 min read
1 view
0 comments


Secure Disposal of Data: ISO 27001 Control 7.14
The secure disposal of equipment is as critical as its proper functioning. ISO 27001 Control 7.14, "Secure Disposal or Re-use of...

Nick Beaugeard
Oct 30, 20232 min read
1 view
0 comments


Maintaining Resilience - Equipment Maintenance: ISO 27001 Control 7.13
In the digital age, where information flows constantly, the reliable functioning of equipment becomes essential. ISO 27001 Control 7.13,...

Nick Beaugeard
Oct 27, 20232 min read
1 view
0 comments


Securing Connections - Cabling Security: ISO 27001 Control 7.12
In the intricate web of modern information systems, the security of data transmission is paramount. ISO 27001 Control 7.12, "Cabling...

Nick Beaugeard
Oct 26, 20232 min read
1 view
0 comments


Powering Information Security - Supporting Utilities: ISO 27001 Control 7.11
Information processing facilities are the engines that drive modern organisations. These facilities are essential for daily operations,...

Nick Beaugeard
Oct 25, 20232 min read
2 views
0 comments


Securing Storage Media: ISO 27001 Control 7.10
In the digital age, managing data storage media is of paramount importance for maintaining the confidentiality, integrity, and...

Nick Beaugeard
Oct 23, 20232 min read
10 views
0 comments


Guardians of Off Premise Assets: ISO 27001 Control 7.9
Security, threats can come from unexpected angles, including off-premises locations. ISO 27001 Control 7.9, "Security of Assets Off...

Nick Beaugeard
Oct 20, 20232 min read
1 view
0 comments
bottom of page