top of page



Protecting Your Digital Backbone: ISO 27001 Control 7.8
Safeguarding sensitive data isn't limited to virtual threats alone. ISO 27001 Control 7.8, "Equipment Siting and Protection," delves into...

Nick Beaugeard
Oct 19, 20232 min read


Maintaining Clarity - Clear Desk, Clear Screen: ISO 27001 Control 7.7
In the intricate world of information security, maintaining clarity and order is crucial. ISO 27001 Control 7.7, "Clear Desk and Clear...

Nick Beaugeard
Oct 18, 20232 min read


Secure Work Environments: ISO 27001 Control 7.6
Ensuring the safety of work environments is a foundational element. ISO 27001 Control 7.6, "Working in Secure Areas," focuses on creating...

Nick Beaugeard
Oct 17, 20232 min read


Shielding Against Threats: ISO 27001 Control 7.5
Protecting information and ensuring business continuity go hand in hand. ISO 27001 Control 7.5, "Protection Against Physical and...

Nick Beaugeard
Oct 16, 20232 min read


Continuous Vigilance - Physical Security Monitoring: ISO 27001 Control 7.4
In the digital age, maintaining robust security measures is crucial to safeguarding sensitive information and maintaining business...

Nick Beaugeard
Oct 13, 20232 min read


Bolstering Physical Security: ISO 27001 Control 7.3
In the realm of information security, safeguarding access to physical spaces is a foundational element. As an IT professional with a keen...

Nick Beaugeard
Oct 12, 20232 min read


Securing Entry Points: ISO 27001 Control 7.2
In the realm of information security, safeguarding access to sensitive areas is a fundamental principle. As an IT professional with a...

Nick Beaugeard
Oct 11, 20232 min read


Defining Security Perimeters: ISO 27001 Control 7.1
In the dynamic landscape of information security, establishing boundaries and perimeters is akin to laying a strong foundation for a...

Nick Beaugeard
Oct 10, 20232 min read


Reporting Information Security Events: ISO 27001 Control 6.8
Staying vigilant and responsive to potential threats is essential. I'm eager to explore Control 6.8, "Information Security Event...

Nick Beaugeard
Oct 9, 20232 min read


Remote Working Security: Navigating ISO 27001 Control 6.7
In today's dynamic work landscape, remote work has become a prevalent practice. I'm excited to delve into Control 6.7, "Remote Working,"...

Nick Beaugeard
Oct 6, 20232 min read


Confidentiality Agreements: Enhancing Information Security with ISO 27001 Control 6.6
In the digital age, where data is a valuable asset, safeguarding sensitive information is paramount. I'm excited to explore the...

Nick Beaugeard
Oct 5, 20232 min read


Continuity Beyond Employment: Understanding ISO 27001 Control 6.5
Maintaining a strong defence requires not only robust technological measures but also a well-defined strategy that extends beyond an...

Nick Beaugeard
Oct 4, 20232 min read


Disciplinary Process: Unveiling ISO 27001 Control 6.4
In the realm of information security, maintaining a strong line of defence requires not only robust technological measures but also a...

Nick Beaugeard
Oct 3, 20232 min read


Information Security Awareness, Education, and Training: Unveiling ISO 27001 Control 6.3
In the dynamic landscape of cybersecurity, knowledge and awareness are the first lines of defense against potential threats. As an...

Nick Beaugeard
Oct 2, 20232 min read


Terms and Conditions of Employment: Understanding ISO 27001 Control 6.2
Safeguarding sensitive information is a top priority for organisations across industries. As an experienced IT professional and ISO 27001...

Nick Beaugeard
Sep 29, 20232 min read


Unveiling ISO 27001 Control 6.1: Screening for Security
In the modern digital landscape, the security of sensitive information holds paramount importance. As an experienced IT professional and...

Nick Beaugeard
Sep 28, 20232 min read


Control 5.37: Documented Operating Procedures for Information Processing Facilities
In the dynamic realm of information security, clarity and consistency are paramount. Enter Control 5.37, a fundamental building block...

Nick Beaugeard
Sep 27, 20232 min read


Control 5.36: Compliance with Policies, Rules, and Standards for Information Security
In the intricate world of information security, navigating the labyrinth of policies, rules, and standards is paramount. Enter Control...

Nick Beaugeard
Sep 26, 20232 min read


Control 5.35: Independent Review of Information Security
In the realm of information security, the quest for excellence never truly ends. Enter Control 5.35, a vigilant sentinel that ensures...

Nick Beaugeard
Sep 25, 20232 min read


Control 5.34: Safeguarding Privacy and Personal Identifiable Information (PII)
Personal information is a prized possession. Control 5.34, "Privacy and Protection of Personal Identifiable Information (PII)," stands as...

Nick Beaugeard
Sep 22, 20232 min read
bottom of page