INTERTEC BLOG

Our Latest Content is on the FPT Blog

Feel free to browse our existing content below, however, if you're looking for the latest articles, we now post them to FPT Software's blog page

You Have Your ISO 27001 Certification. Now What?

May 27, 2021 / by Frederid Palacios posted in Cyber Security

0 Comments

Once you have earned your ISO 27001 certification, it is crucial that you maintain and improve upon your ISMS to ensure its continued success.
Read More

The Best Use of Corrective Actions in ISO 27001 Implementation

May 25, 2021 / by Frederid Palacios posted in Cyber Security

2 Comments

The corrective action process systemizes how you make improvements in your company, which every organization must do to grow and succeed.
Read More

ISO 27001 Management Reviews: Both Misunderstood & Underappreciated

May 20, 2021 / by Frederid Palacios posted in Cyber Security

1 Comment

The management review is about so much more than compliance, use this practice to build a relationship with your decision makers and strengthen your ISMS.
Read More

Looking Within: Your Internal ISO 27001 Audit

May 18, 2021 / by Frederid Palacios posted in Cyber Security

0 Comments

Conducting and completing your internal audit is a significant step to becoming certified, so make sure that you are prepared.
Read More

Monitoring your ISMS is Critical in ISO 27001 Certification

May 13, 2021 / by Frederid Palacios posted in Cyber Security

0 Comments

It is crucial that you continuously monitor your ISMS to ensure that it is working efficiently to protect your information.
Read More

Differences Between SOC 2 and ISO 27001

May 6, 2021 / by Frederid Palacios posted in Cyber Security

3 Comments

While similar, ISO 27001 and SCO 2 hold some prominent differences that you should be aware of before choosing the best framework for your organization.
Read More

What is SOC 2 Compliance and Why is it Important?

May 4, 2021 / by Frederid Palacios posted in Cyber Security

0 Comments

An alternative to ISO 27001, SCO 2 is a similar information security compliance process designed to protect private data.
Read More
1
Contact Us