Video Library

Quick Guide to Cyber Security

Certifying to ISO 27001 provides measurable advantages and value to organisations that go well beyond simply satisfying client requirements.

In this short video, we share the key benefits of implementing ISO 27001 reported by organisations that have achieved certification to the Standard.  These include reducing business risk, inspiring trust, competitive edge in the market, and more.

This clip is taken from URM’s webinar on How to Achieve ISO 27001:2022 Certification.

Contact the InfoSec Experts Today

Having assisted over 450 organisations to implement an ISMS and then achieve ISO 27001 certification since the Standard was first published in 2005, we at URM are the ideal partners to help you certify.  With our fully-tailored approach, our specialists can support you through each stage of the ISO 27001 management system lifecycle, offering guidance specific to your organisation’s unique requirements.  

Get in touch with our information security experts today to find out more.

Contact Us

InfoSec Solutions & Products

One the key requirements of ISO 27001 is the need for a robust risk assessment process which can produce repeatable and comparable results.  With its proven, best practice methodology, URM’s information security risk management software, Abriska 27001, enables you to meet this requirement.   We can also assist you to raise and maintain awareness among your staff with our expertly designed and engaging learning management system (LMS), Alurna.

View Products

InfoSec Training Courses

Our information security and risk management training courses can help you learn how to effectively manage information security.  Our Certificate in Information Security Management Principles (CISMP) and Practitioner Certificate in Information Risk Management  (PCIRM) training courses will prepare you to take the BCS (Chartered Institute for IT) administered exams, enabling you to gain industry-recognised qualifications.

View Training Courses

Webinars & Events

URM has gained a reputation as the preeminent UK provider of live webinars, aimed at delivering valuable and practical insights to organisations  looking to improve their information security, risk management, data protection etc. The webinars  are delivered by our senior consultants who share hints and tips on topics such as certifying to ISO 27001 and Cyber Essentials, complying with the GDPR.  All of our webinars are completely free to attend, and include an opportunity to ask questions at the end.

WebinarHow to Achieve ISO 27001 Certification

Learn how to achieve ISO 27001 certification with guidance from URM and BSI. Understand key steps, benefits, and pitfalls in implementing an effective ISMS.

Read more
Listen to recording
USB stick, Padlock, Keys
WebinarEmbedding PCI DSS into Everyday Security

This webinar focuses on turning PCI DSS from a point‑in‑time certification into an ongoing, integrated security practice.

Read more
Listen to recording
USB stick, Padlock, Keys
WebinarHow to Achieve ISO 27001:2022 Certification

Join URM & BSI for expert guidance on achieving ISO 27001 certification, maximising benefits, and avoiding pitfalls in information security management.

Read more
Listen to recording
USB stick, Padlock, Keys

Information Security FAQs

What are 4 types of information security?

If we look to guidance from Annex A of ISO 27001, then the answer is organisational, people, physical and technological.  The International Standard groups information security into these 4 categories.  The ‘organisational’ category requires the creation of policies, roles and responsibilities and day-to-day business activities.  The ‘people’ category ensures that the most appropriate staff are employed, and that they understand what is expected of them in relation to the business’ approach to infosec.  ‘Physical’ controls relate to the security of business premises, clear desk policies etc, whilst, ‘technological’ controls relate to measures that may be adopted by organisations to assist in securing information through the use of technology such as capacity management, configuration management, change management, network security, firewalls, cryptography etc.

What are the 3 principles of information security?

The three aspects that information security (infosec) seeks to protect are ‘confidentiality’, ‘integrity’ and ‘availability’. Confidentiality ensures that information is not made available or disclosed to unauthorised entities.  Integrity protects the accuracy and completeness of assets, whilst Availability ensures that information is accessible and usable on demand by authorised individuals.tc.

What are information security examples?

Examples of information security include encryption, firewalls, antivirus software, multi-factor authentication (MFA), vetting of individuals, controlling access to premises / information and providing staff awareness training.

What are 5 information security policies?

Policies provide direction on your organisation’s approach to different aspects of information security management. Policies may relate to the classification of data, password management, acceptable use of assets, authentication procedures and incident response - these are five examples, but your organisation  may choose to formulate a policy relating to any aspect of information security (infosec) management.

Read more
Information Security FAQ

Are you looking to implement ISO 27001? Or certify against the Standard?

URM offers a host of consultancy services to assist you implement and maintain ISO 27001, including gap analyses, risk assessments, policy development, auditing and training.

ISO 27001 Clause 9.1: Monitoring, Measurement, Analysis and Evaluation Explained

Published on
1/4/2026

URM’s blog explores ISO 27001 Clause 9.1, what it requires and practical guidance on how to implement this Clause in full conformance with the Standard.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
23/3/2026
Continuous Compliance With the PCI DSS

URM’s blog outlines how continuous compliance fits into PCI DSS, and explores practical ways to integrate requirements into business-as-usual (BAU) operations.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
20/3/2026
ISO 27001 – Clause 6.3: The Importance of Planned ISMS Change Management

URM’s blog explains the purpose & requirements of ISO 27001 Clause 6.3, types of ISMS change it covers, and key considerations when putting it into practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
20/2/2026
Information Security Risk Assessment and Treatment: Understanding Relevant Risks

URM’s blog explains the building blocks of information security risk, outlining how risks can be valued and prioritised, the role of rise appetite, and more.

Read more
"
After a bad experience with a previous provider, we looked to URM for QSA support. The URM QSA we have worked with is phenomenal, and considerably better than our previous QSAs. My team enjoy working with him, and find him to be extremely credible and effective.
CISO at University of Surrey