All products and services
1~30 item / All 284 items
-
What are the types of information security? An explanation of technical, physical, organizational, and human measures.
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
last updated
-
A detailed explanation of "network key"
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
last updated
-
What are the reasons why screen saver settings are needed now?
Explaining the specific settings for the screensaver and points to be aware of during the setup!
last updated
-
What are the risks lurking in cloud security?
I will explain in detail the measures that cloud server administrators should take!
last updated
-
Is "garbage" being targeted? Three tactics of trashing and immediate countermeasures you can take.
Explaining the high probability of successful unauthorized access known as "trashing"!
last updated
-
Protecting Against Robocall Scam Calls: Practical Security Measures for Businesses
We will also explain the methods of robocalls, the risks for companies, and key countermeasures!
last updated
-
Explaining the key points for obtaining a P mark in a web production company!
We will also introduce the benefits of obtaining a P mark and the personal information held by web production companies and how it is handled!
last updated
-
How should My Number be handled when obtaining the P Mark (Privacy Mark)?
Introducing the relationship between the Privacy Mark and My Number, along with two points to note and guidelines for safety management measures!
last updated
-
How much does it cost to obtain and renew the P mark?
It will also explain how the business size classification for the P mark is determined.
last updated
-
Security measures required for obtaining ISMS <International Standard>
I will also explain the advantages and disadvantages of obtaining ISMS!
last updated
-
What is the duration and required documents for ISMS audits? Explanation of cases of failure and how to address them.
Explanation of the flow of ISMS audits and how to handle non-conformities!
last updated
-
[P Mark] Key Points to Keep in Mind When Acquiring for the First Time
Explanation of the significantly revised P Mark examination criteria as of April 1, 2022!
last updated
-
What is a DDoS attack?
A Complete Explanation of Distributed Denial of Service Attacks That Even Beginners Can Understand! Introducing Useful Information to Prevent DDoS Attacks.
last updated
-
Beware of malicious adware! An explanation of types and removal methods.
There is also malicious adware that collects personal information and hacks systems!
last updated
-
What is an information security policy? An explanation of its contents and operational methods!
A detailed explanation from the formulation of the information security policy to its operational methods!
last updated
-
How to Identify Fraudulent Websites: 7 Checklists to Avoid Being Scammed
This is useful information for those who use online shopping sites, so please read it all the way to the end!
last updated
-
Learn from domestic cases! Consider what should be done now based on the causes of information leaks.
Introducing cases of ransomware damage, internal fraud, and unauthorized use of credit card information!
last updated
-
Purpose, implementation methods, and actual process of internal audits <P Mark>
We will also introduce who conducts the internal audit and who receives the internal audit!
last updated
-
Points for Choosing a Consultant for Acquiring the Privacy Mark (P Mark)
Explaining what consultants do and what to watch out for when choosing a consulting firm!
last updated
-
The three fundamental elements of information security, "CIA," and four new elements.
Explanation of the three elements of confidentiality, integrity, and availability, and the four elements of authenticity, reliability, accountability, and non-repudiation!
last updated
-
Flow and Methods of Managing Outsourcing Partners <Supplier Management>
An explanation of the evaluation methods for contractors and the frequency of checks on their information security systems!
last updated
-
A thorough explanation of the flow and methods for managing outsourced partners to protect privacy.
We will also introduce the supervision and evaluation criteria formulation for the contractor, as well as the conclusion of contracts with the contractor!
last updated
-
Operational Status Checklist for Internal Audit of P Mark
We will also introduce the details of internal audits and the benefits of using checklists!
last updated
-
What rules should companies with P Mark certification follow for password management?
We will also introduce the necessity of regularly changing passwords and points to be careful about in management!
last updated
-
What is internal audit in the P Mark?
We also introduce recommended qualifications for security personnel! Please use this as a reference for obtaining qualifications.
last updated
-
What constitutes personal information under the P Mark? Specific examples by industry.
We will also introduce sensitive personal information in the context of personal information protection!
last updated
-
Explanation of the period and schedule for obtaining ISMS.
We will also introduce tips and tricks for achieving project success!
last updated
-
How much does it cost to obtain ISMS (ISO 27001)?
We will also introduce consulting fees and security measures costs!
last updated
-
What are the points to note when using the Privacy Mark logo? <P Mark>
We will also introduce an overview of the logo, the design concept, and the correct usage!
last updated
-
Advantages and disadvantages of obtaining ISMS (ISO 27001)
We will also introduce the construction and operation of ISMS! Please use this to assist you in preparing for strengthening information security.
last updated