Information Security

Increasing numbers of companies store information of high importance or confidentiality in electronic databases. This information may vary from customers’ personal data to banking information and sensitive company data, and the impact of its loss is very high because of its importance. Such information can be protected by a robust Information Security Management System (ISMS), which contains policies and procedures that cover all legal, physical and technical controls involved.

If you’re new to information security, then take a look at some of our recommended reading:

 

Download our free green paper on information security and ISO27001

This green paper contains an overview of Information Security and ISO27001 and is an ideal read for beginners. Simply enter your email address into the box below and a copy of the green paper will be sent to you automatically.

Information security defined

Information security is defined as the process of keeping data or information systems protected against unauthorised access, destruction, or disruption. Security professionals frequently refer to three main concepts:

  • Confidentiality - The assurance that only authorised users can access the information.
  • Integrity - The assurance that information cannot be modified without authorisation, and that any modification is detected and consistency is maintained.
  • Availability - The guarantee that information is available and that communication channels are working correctly when needed.

The protection of confidential information from competitors and black hat hackers is a critical business issue in South Africa. Failing to improve information security in your organisation may lead to permanent financial loss and reputational damage. Information security requirements are becoming an ethical and legal necessity in South Africa.

 

Information Security Awareness

To learn more on how to ensure that you and your staff are fully aware of information security risks and how to achieve effective information security in your business, we recommend:

 

You may also be interested in: