Frequently Asked Questions

Information Security

information security
Information Security FAQ

We are answering questions like:
What is information security? What should an information security policy include? What are the principal methods of managing passwords? What is password expiration?
And many more...

Read more
information security
ISO 27001 FAQ

We are answering questions like:
What is ISO 27001? How Does ISO 27001 Work? Why Does ISO 27001 Matter?
And many more...

Read more
information security
ISO 27001 Internal Auditing FAQ

We are answering questions like:
What is an ISO 27001 internal audit? How do you develop an internal audit checklist for ISO 27001?
And many more...

Read more
information security
PCI DSS FAQ

We are answering questions like:
What is PCI DSS? What Payment Cards are in Scope of the PCI DSS? Who 'Manages' the PCI DSS?
And many more...

Read more

Business Continuity

Business Continuity
Business Continuity FAQ

We are answering questions like:
What is business continuity? What are the 5 components of a business continuity plan? What should a business continuity plan include?
And many more...

Read more

Data Protection

Data Protection
Data Protection FAQ

We are answering questions like:
What does data protection mean? What are the basics of data protection from an organisational perspective? Why are the data protection principles important?
And many more...

Read more
Data Protection
GDPR FAQ

We are answering questions like:
What is Personal Data? What is Data Subject? What Does 'Processing' of Personal Data Include?
And many more...

Read more

Cyber

Cyber
Cyber Essentials FAQ

We are answering questions like:
What is Cyber Essentials? What is Cyber Essentials Plus? What are the Bennefits Attached to Gaining Cyber Essentials Certification?
And many more...

Read more
CYBER
Penetration Testing FAQ

We are answering questions like:
What are the main types of penetration testing? What’s the difference between venerability scanning and penetration testing? Do I need both a vulnerability scan and penetration test?
And many more...

Read more

Training

Data Protection
CISMP FAQ

We are answering questions like:
What is CISMP? How Do I Attain the CISMP? What is Meant by Principles? What Topics Does the CISMP Cover?
And many more...

Read more
Cyber
PCIRM FAQ

We are answering questions like:
What is PCIRM? Who is PCIRM Aimed at? What Are the Benefits of Attending a PCIRM Course?
And many more...

Read more

Product

product
Abriska 19011 FAQ

We are answering questions like:
What is Audit Management Tool – Software ?
And more...

Read more
product
Abriska 22301 FAQ

We are answering questions like:
What is the purpose of a Business Impact Analysis (BIA)? What Are the BIA and Risk Assessment Requirements?
And many more...

Read more
product
Abriska 27001 FAQ

We are answering questions like:
What is Information Security Risk Management? What Are the Risk Management Requirements of ISO 27001?
And many more...

Read more
product
Abriska 27036 FAQ

We are answering questions like:
What Are the Challenges of Information Security? How Can Supplier Risk Management Software or Tools Help?
And many more...

Read more
product
Abriska 31000 FAQ

We are answering questions like:
What is Enterprise Risk Management? What is ISO 31000? What is Enterprise Risk Management Software?
And many more...

Read more
product
Alurna FAQ

We are answering questions like:
What Training Formats Does Alurna Offer? How Easy is Alurna To Use? What Training Formats Does Alurna Offer?
And many more...

Read more
"
Enjoyed the redacting exercise at the end, which was interesting to see how people would redact the information differently I found this really useful to apply to SARs I might receive going forward, and that it's down to interpretation.
How to Manage Data Subject Access Requests (DSARs) Course