
- 52 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
What if you suffer an information security breach?
Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance and treatment based on ISO27001: 2013 helps you to manage this threat by detailing what to do as soon as you discover a breach.
Be prepared, be prompt, be decisive
When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and decisive action. Updated to cover ISO27001: 2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual.
A recovery plan will help you to:
- recover, and resume normal operations, more quickly
- preserve customer confidence by quickly resolving service disruption
- secure evidence to help with any criminal investigation and improve your chances of catching those responsible.
Read this guide and find out how to manage in the face of a data breach.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title
- Copyright
- Contents
- Introduction
- Chapter 1: What constitutes a breach?
- Chapter 2: Treatment using ISO27001
- Chapter 3: Case studies
- ITG Resources