The ISMS is based on a professional advice.
applicable service in any technology-based institution.
Reports for improving computer security.
plans, organic structure, Politics and procedures.
Computer visualization risks.
The system security management aims to maintain adequate levels of integrity, availability and confidentiality of information assets.
- More of 60% a number of companies surveyed said they had had internal problems due to lack of information backup.
- El 50% of them he admitted to having been attacked by a computer virus.
El 30% of the companies surveyed have suffered income on their systems by unauthorized persons.
- El 30% of the companies surveyed have suffered income on their systems by unauthorized persons.
|Professional Consulting EXESeguridad||X||X||X|
|Action Plan outlines (show risks)||x|
|detailed and documented action plan||X||X|
- CONICYT and IT System Security The National Commission for Scientific and Technological Research (CONICYT) did not have full knowledge of their IT services either availability or information assets that generated, Besides, they could not ensure the integrity of the information being processed. Para esto, EXE relied on the team to implement a Security Management System ISMS Information Security, This system would allow a regular, according to ISO standards 27001, how they should be organized and ... Seguir leyendo
For further information on the computer security system, Please complete the following contact form: