{"version":"1.0","provider_name":"(\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9","provider_url":"https:\/\/bap-software.net\/kr","author_name":"Dao Thanh","author_url":"https:\/\/bap-software.net\/kr\/author\/daothanh\/","title":"ISMS And The Reason For Implementing One","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dfRWbagkSw\"><a href=\"https:\/\/bap-software.net\/kr\/isms\/\">ISMS And The Reason For Implementing One<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/bap-software.net\/kr\/isms\/embed\/#?secret=dfRWbagkSw\" width=\"600\" height=\"338\" title=\"&#8220;ISMS And The Reason For Implementing One&#8221; &#8212; (\u65e5\u672c\u8a9e) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a-\u30aa\u30d5\u30b7\u30e7\u30a2\u30b5\u30fc\u30d3\u30b9\" data-secret=\"dfRWbagkSw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","thumbnail_width":650,"thumbnail_height":365,"description":"Information security is considered as a part of making the brand, reputation and prestige of each business, so that the management of information security for BAP SOFTWARE not only protects brand name but also is an opportunity to better protect the company&#8217;s information property as well as raising awareness of information security at work through training and application of ISMS for employees. So, did you know ISMS before? An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization&#8217;s sensitive data. The goal of an ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach. An ISMS typically addresses employee behavior and processes as well as data and technology. It can be targeted towards a particular type of data, such as customer data, or it can be implemented in a comprehensive way that becomes part of the company&#8217;s culture. ISO 27001 is a specification for creating an ISMS. It does not mandate specific actions, but includes suggestions for documentation, internal audits, continual improvement, and corrective and preventive action It enables compliance with a host of laws and focuses on protecting three key aspects of information: Confidentiality: The information is not available or disclosed to unauthorised people, entities or processes. Integrity: The information is complete and accurate, and protected from corruption. Availability: The information is accessible and usable by authorised users. Benefits of an ISMS An ISO 27001-compliant ISMS does more than simply help you comply with laws and win business. It a can also: Secure your information in all its forms: An ISMS helps protect all forms of information, whether digital, paper-based or in the Cloud. Increase your attack resilience: Implementing and maintaining an ISMS will significantly increase your organisation\u2019s resilience to cyber attacks. Manage [&hellip;]"}