TITLE

Law firm gets competitive with ISO 27001

AUTHOR(S)
Ashford, Warwick
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/27/2007, p7
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that after becoming certified in the global ISO 27001 information security standard, the law firm Irwin Mitchell has significantly reduced the number of security incidents this year. Peter Sloane, business improvement manager at Irwin Mitchell said certification has introduced a structured approach to security management and also significantly improved the company's competitiveness. Prospective clients are increasingly calling on legal firms to prove their information credentials as part of the tendering process, he said.
ACCESSION #
27963144

 

Related Articles

  • Application Layer Security Issues and Its Solutions. Raghavendra, K.; Nireshwalya, Sumith // International Journal of Computer Science Engineering & Technolo;Jun2012, Vol. 2 Issue 6, p1266 

    Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and...

  • Application Layer Security Issues and Its Solutions. Raghavendra, K.; Nireshwalya, Sumith // International Journal of Computer Science Engineering & Technolo;Jun2012, Vol. 2 Issue 6, p1266 

    Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and...

  • The Devil is in the Microcode. Price, Andrew // ITNOW;Dec2011, Vol. 53 Issue 6, p32 

    Today's coders are more designing rather than writing real code, says Andrew Rice of HP Information Security.

  • Secure Software. Niblett, Gareth // ITNOW;Dec2011, Vol. 53 Issue 6, p25 

    Welcome to Information Security Now (ISNOW) in its new home in ITNOW. Since security and IT are often inseparable neither should be ignored, says Gareth Niblett chair of BCS ISSG.

  • Special Publicly Verifiable Secret Sharing Scheme for LEO Satellite Networks. Liu Xiao-Yue; Tian You-Liang; Ma Jian-Feng; Xiao Zhu // International Journal of Digital Content Technology & its Applic;Nov2011, Vol. 5 Issue 11, p378 

    Security and privacy in satellite networks are an important and active research area. A number of challenges are arisen due to the limited computational, storage and communication abilities of typical satellite networks. This work describes a simple and inexpensive a special publicly verifiable...

  • Risk Analysis of Inter Base-station Dynamic Resource Sharing in IEEE-802.22 MAC Layer Protocol. Shaukat, Rakhshanda; Khan, Shoab Ahmed // International Journal of Digital Content Technology & its Applic;Nov2011, Vol. 5 Issue 11, p60 

    Security is always a key concern for the networks. This paper concentrates on security threats of Inter Base-station Dynamic Resource Sharing, one of the key features of IEEE-802.22. This paper has identified weak spot related to channel release requests during resource sharing process and has...

  • The Cost of Doing the Right Thing.  // Information Security;Jun2010, Vol. 12 Issue 5, p8 

    The author discusses the aspects of what it would take to do things successfully in terms of computer security. He agrees with the process of changing company computer practice through new structure, policies and rules to be able to bring about real change. Also discussed is the article...

  • IN HARMONY. SCHNEIER, DAVID // Information Security;Jun2010, Vol. 12 Issue 5, p38 

    The article focuses on the required steps to develop the governance, risk and compliance (GRC) program. The three key activities for the development of a GRC program framework include making an inventory of requirements and aligned controls of functions, aligning the controls in terms of the...

  • Untitled. Bradbury, Danny // Computer Weekly;10/7/2008, p12 

    The article presents a reprint of the article that focuses on securing applications on a network, by Danny Bradbury, which appeared in "Infosecurity" magazine. It offers information on how to secure applications on a network. It indicates the need of users or application functions to be given...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics