Cyber Security Standards
Information Security Management Standard
Although becoming certified with ISO/IEC 27001 demonstrates that as an organisation you have gone that extra mile towards being secure, for many small and medium size businesses (SMBs), ISO/IEC 27001 would simply be unnecessary.
There are plenty of other ways you can begin to protect your business and improve your approach to securing information. Which is why, for the UK based SMB, we recommend our Cyber Maturity Assessment (CMA), or the National Cyber Security Centre (NCSC) Top 10 standard – depending on your business needs:
our CMA will help to determine which of the recognised information security standards is more appropriate for your business.
the NCSC Top 10 is essentially a sub-set of the ISO/IEC 27001 standard tailored to meet the requirements of smaller companies like yours.
Why do ISMS benefit business
We believe that an Information Security Management Standard (ISMS) describes and demonstrates your organisation’s approach to Information Security. Implementing an ISMS is key to growing your business securely, protecting the information – the foundation of your business.
An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber-attacks, data leaks and theft. They are part of the larger scope of effective cyber security solutions aiming to protect your information assets.
At H2 our aim is to help you use a cyber security ISMS by working closely with you to develop one tailored to the needs of your business.
Reduce the need for frequent audits and get a cyber security ISMS in place today.
ISO 22301: 2012 Business Continuity Management Systems
How prepared are you for an incident that will disrupt your business?
BCMS – Business Continuity Management Systems, is the set of requirements, needed in societal security, that will help organisations, regardless of their size, location or activity, be better prepared and more confident to handle disruption of any type.
What is ISO 22301?
The international standard of ISO 22301:2012 is a best-practice framework for an efficient and effective BCMS. Security at this level tends to sound more complex, but we are on hand to help navigate from planning steps towards certification, to understanding terminology, such as:
societal security –the ability of a society to continuing functioning as ‘normal’ under changing conditions and possible or actual threats
human security – shifting security from state to the individual within society.
state security – a traditional security which is about a state's ability to defend itself against external threats
Our H2 experts are available to guide your training towards an extremely important standard. Even if you have a checklist ready, we can help identify gaps. We believe that having an effective business continuity plan will help you to recover quickly from any disaster.
With years of experience in the industry, we can help you get expert guidance on implementing a BCMS.
If you would like H2 to help you implement a cyber security ISMS then please contact us today on 01733 602183/01780 678199 or through our website >
If you would like to know more about our range of services here at H2 then please contact us today on 01733 602183 or 01780 678199 or complete our contact form.Click here to get started >
We originally engaged H2 to examine our liability under GDPR and devise risk managed policies and processes to ensure we met the requirements. Their Cyber Maturity Assessment is certainly and eye opener and H2s approach, unique in our experience of IT service companies, demonstrated clearly that we had some issues to overcome. They were patient in providing services at our own pace and at price points which we were happy with, and were comfortable working with our current IT provider, enhancing their services and products, and plugging gaps that they do not cover. I have no hesitation in recommending H2 to other companies who need such services.
H2 helped us through every step of the way ensuring are systems were robust and compliant, great job guys. JMR
We invited H2 to make a full assessment of our IT infrastructure and processes and we were very impressed with their overall methodology and approach to the project. We now feel that we have an secure environment and with ongoing support from H2 we couldn't be happier. TD
We thought GDPR could be a serious issue for our business but H2 came in and explained what we needed to do and how we can stay compliant wit the law. Bob was extremely helpful and kept everything simple and easy to understand.
We had a very complex requirement and H2 broke it down into its component parts and project managed the entire process, they now offer ongoing support and we would thoroughly recommend them to any prospective customer.