Assistance materials

Assistance materials
You can download the materials distributed at the seminar!
31~54 item / All 54 items
-
What if I get infected with a Trojan horse? How is it different from a virus?
Explaining the differences between viruses and ransomware, as well as measures to prevent infection!
last updated
-
What is the duration and required documents for the ISMS audit?
We also explain cases of failing the review and how to deal with them!
last updated
-
What is the typical cost of consulting for obtaining ISMS certification?
Tips for Comparing Service Providers Explained! Introducing the Benefits of Using ISMS Certification Support Services.
last updated
-
Benefits of Introducing E-Learning for Regular Training on P Mark/ISMS!
The introduction of e-learning has many benefits!
last updated
-
What is malware? An explanation of its types, infection routes, and measures that should be taken within companies.
An overview of malware, its types, and measures to prevent infection will be introduced!
last updated
-
What is ISMS-AC (Information Management System Certification Center)?
I will also explain the differences between the certification of ISMS certification bodies and JIPDEC!
last updated
-
What is the information security policy of ISMS? What items are required?
I will introduce you to the alignment with information security objectives and other related matters!
last updated
-
What does "operation verification" in the P Mark mean? What is the difference from "internal audit"?
Introducing how to proceed with operational verification and the items to check during the verification!
last updated
-
Content and procedures for internal training on the P Mark.
Introducing our E-Learning, which is suitable for education on P Mark and ISMS!
last updated
-
What rules should companies with P Mark certification follow for password management?
You don't have to change your password regularly, and we will introduce recommended password management methods!
last updated
-
Explaining the key points of business card management that companies obtaining the P Mark should keep in mind!
Introducing what can be solved with business card management services and tools, along with recommended handling methods!
last updated
-
Block suspicious emails! What are effective measures against targeted attack emails?
Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!
last updated
-
What is a targeted attack? Is there anything we should do to prepare for emergencies?
For those who want to review their company's security system at this opportunity, we also support obtaining ISMS certification!
last updated
-
Explaining Cybersecurity! How is it different from Information Security?
An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!
last updated
-
Thorough explanation of symptoms, countermeasures, and prevention methods in case of malware infection!
Introducing useful information on methods to minimize malware damage!
last updated
-
What is the expiration date for the P mark renewal?
A detailed explanation of the validity period of the P mark, renewal methods, required documents, and how to prepare for expiration!
last updated
-
A clear explanation of the differences between ISMS and P Mark!
Not only can it reduce the risk of information leakage, but it also contributes to enhancing the company's external credibility!
last updated
-
What is the cloud security certification that has been frequently heard about lately? <ISMS>
There are many types of cloud security certifications, but let me introduce some representative ones!
last updated
-
How will the information security training for ISMS be conducted?
Introduction to practical information security education materials available for free and how to implement them!
last updated
-
What are the types of information security? An explanation of technical, physical, organizational, and human measures.
A detailed explanation of definitions, types, and countermeasures. This is useful information for those using IT equipment in the workplace.
last updated
-
A detailed explanation of "network key"
Points for maintaining a safe internet environment! An explanation of the types and risks when not used properly.
last updated
-
What are the risks lurking in cloud security?
I will explain in detail the measures that cloud server administrators should take!
last updated
-
Is "garbage" being targeted? Three tactics of trashing and immediate countermeasures you can take.
Explaining the high probability of successful unauthorized access known as "trashing"!
last updated
-
What are the reasons why screen saver settings are needed now?
Explaining the specific settings for the screensaver and points to be aware of during the setup!
last updated