All products and services
1~30 item / All 291 items
-
We held a study session for ISMS personnel.
I will explain the trends in ISMS audits and measures against information leaks, divided into the first half and the second half!
last updated
-
Are business cards considered personal information? A thorough explanation of the risks and safe management methods!
We will also introduce cases that are not applicable for personal use!
last updated
-
Criteria for Judging Information Security Risk Acceptance and Its Advantages and Disadvantages
A detailed explanation of the "acceptance" method among risk response strategies.
last updated
-
What is a risk assessment sheet? (Risk Assessment)
I will explain the content that should be included and the points to be careful about when creating it!
last updated
-
What are the risk assessment methods in the cloud era?
We will introduce examples of risk assessments and support for obtaining ISMS!
last updated
-
What is the Privacy Mark?
I will explain the 'Certificate of Assurance Regarding Personal Information Protection' and its effects!
last updated
-
What is ISMS-AC (Information Management System Certification Center)?
I will also explain the differences between the accreditation of ISMS certification bodies and JIPDEC!
last updated
-
What are the types of information security? An explanation of technical, physical, organizational, and human measures.
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
last updated
-
A detailed explanation of "network key"
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
last updated
-
What are the reasons why screen saver settings are needed now?
Explaining the specific settings for the screensaver and points to be aware of during the setup!
last updated
-
What are the risks lurking in cloud security?
I will explain in detail the measures that cloud server administrators should take!
last updated
-
Is "garbage" being targeted? Three tactics of trashing and immediate countermeasures you can take.
Explaining the high probability of successful unauthorized access known as "trashing"!
last updated
-
Protecting Against Robocall Scam Calls: Practical Security Measures for Businesses
We will also explain the methods of robocalls, the risks for companies, and key countermeasures!
last updated
-
Explaining the key points for obtaining a P mark in a web production company!
We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!
last updated
-
How should My Number be handled when obtaining the P Mark (Privacy Mark)?
Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!
last updated
-
How much does it cost to obtain and renew the P mark?
It will also explain how the business size classification for the P mark is determined.
last updated
-
Security measures required for obtaining ISMS <International Standard>
I will also explain the advantages and disadvantages of obtaining ISMS!
last updated
-
What is the duration and required documents for ISMS audits? Explanation of cases of failure and how to address them.
Explanation of the flow of ISMS audits and how to handle non-conformities!
last updated
-
[P Mark] Key Points to Keep in Mind When Acquiring for the First Time
Explanation of the significantly revised P Mark examination criteria as of April 1, 2022!
last updated
-
What is a DDoS attack?
A Complete Explanation of Distributed Denial of Service Attacks That Even Beginners Can Understand! Introducing Useful Information to Prevent DDoS Attacks.
last updated
-
Beware of malicious adware! An explanation of types and removal methods.
There is also malicious adware that collects personal information and hacks systems!
last updated
-
What is an information security policy? An explanation of its contents and operational methods!
A detailed explanation from the formulation of the information security policy to its operational methods!
last updated
-
How to Identify Fraudulent Websites: 7 Checklists to Avoid Being Scammed
This is useful information for those who use online shopping sites, so please read it all the way to the end!
last updated
-
Learn from domestic cases! Consider what should be done now based on the causes of information leaks.
Introducing cases of ransomware damage, internal fraud, and unauthorized use of credit card information!
last updated
-
Purpose, implementation methods, and actual process of internal audits <P Mark>
We will also introduce who conducts the internal audit and who receives the internal audit!
last updated
-
Points for Choosing a Consultant for Acquiring the Privacy Mark (P Mark)
Explaining what consultants do and what to watch out for when choosing a consulting firm!
last updated
-
The three fundamental elements of information security, "CIA," and four new elements.
Explanation of the three elements of confidentiality, integrity, and availability, and the four elements of authenticity, reliability, accountability, and non-repudiation!
last updated
-
Flow and Methods of Managing Outsourcing Partners <Supplier Management>
An explanation of the evaluation methods for contractors and the frequency of checks on their information security systems!
last updated
-
A thorough explanation of the flow and methods for managing outsourced partners to protect privacy.
We will also introduce the supervision and evaluation criteria formulation for the contractor, as well as the conclusion of contracts with the contractor!
last updated
-
Operational Status Checklist for Internal Audit of P Mark
We will also introduce the details of internal audits and the benefits of using checklists!
last updated