At the end of 2019, Axenic’s leadership team agreed to implement our strategy to achieve ISO 27001 certification. This took the form of setting aside resources to spend time on designing and implementing our Information Security Management System (ISMS). In this blog series, we will be taking you through Axenic’s journey to certification – to catch up on Part One of the series click here. In our second blog of the Axenic ISO 27001 certification journey, we take a look at the planning stage and what was involved in this important step.
The Blog
March 2021 Newsletter – Axenic Cybersecurity Commentary
Hot off the “virtual” press is our March newsletter. This month we discuss cyber news such as Accellion vulnerability and consider a use for blockchain and of course the associated risk that comes with this. We also highlight some useful resources such as the OPC’s Principle 12 tools and our very own flexible virtual roles to help you add some extra security muscle to your organisation. Click here to get the full picture.
ISO Blog Series Part 1: ISO 27001 Certification Announcement
Last week was an exciting week for the Axenic team with some big news. We are extremely proud that we achieved the ISO/IEC 27001:2013 certification and we don’t underestimate what a huge accomplishment this is for our business and importantly – our customers. Information security is at the core of what we do at Axenic, and we wanted to practice what we preach. You may be interested in getting ISO/IEC:2013 27001 certification for your organisation – read on to find out why we went through this process and what it means for our clients.
Changes to the NZ Privacy Act – the things you need to know
As I’m sure many of you are aware, the New Zealand Privacy Act 2020 came into effect on the first of December last year.
In this blog, we’re going to give you a quick rundown of the changes that have been made to the Privacy Act, and how they might affect you. While this isn’t an exhaustive list, it should hopefully cover the most substantial changes.
Cybercrime is the gift that keeps giving
Being the grinches that we are we thought that instead of giving you a gift this Christmas we’d give you a warning! You’ll get a lot of messages over the next few days and weeks wishing you season’s greetings. Amongst them though, will be well-wishers with more sinister motives. My family has already received a scam SMS: it told us we had a package with an outstanding duty payment on it (of $2) and we just needed to follow the link to pay the amount and release our package. This is pretty typical of delivery scams that many kiwis are receiving at the moment. Luckily we had a bit of skepticism and a handy cybersecurity expert to seek advice from!
Cake, Depression and Cybersecurity: One Man’s Journey into Artificial Intelligence
It seems like everyone is talking about applying artificial intelligence and machine learning to security data, if you believe the hype you’d think that all you need to do is install a vendor’s product, and hey presto your problems are solved. My experiments with a manic depressive chatbot showed me that perhaps, it’s a bit more complicated than that!