25 November 2021
When it comes to third party information security risk management, how do you ensure that the third parties engaged to do work for your organisation preserve the confidentiality, integrity, and availability of your information?
Often their “work” could include access to your organisation's data, intellectual property, financials, operations, or other sensitive information.
Here are three reasons why cyber security must be a key consideration when collaborating with suppliers and partners:
Some examples of the steps you can take to make improvements in this third-party risk area include:
It is well worth getting this aspect of your IT and business operations in hand, in doing so you will help to protect your business from a range of possible reputational, regulatory, financial and legal issues.
Being able to demonstrate a good level of cyber security is increasingly a key component of supplier and provider contracts. To read about how we can assist you to conduct a comprehensive third party information security risk review Click Here.
An upgrade to Version 21 of the IT Policy System is available now. All customers with current maintenance in place will have received details of the steps required to upgrade in the last few days.
Version 21 incorporates the following enhancements and changes:
Since the release of Policy Management as a Service (PMaaS) we have migrated several customers from their on-premise Policy Systems to either the Essentials or Premium versions of PMaaS. As organisations are increasingly adopting cloud-based delivery of applications a move to PMaaS is a very easy step.
A migration can be completed by our team in as little as 48 hours with all existing customer policy and mapping content made visible in PMaaS.
Feedback on the new functionality so far has been positive, Click Here to view more details.
We would encourage all customers of the Policy System (on-premise version) to book in a 20 minute demonstration of Policy Management as a Service. Contact us today!