All products and services
31~60 item / All 284 items
-
Targeted Attack Email Exercise
The ultimate weapon against ransomware! Experience simulated email attacks to raise employee awareness.
last updated
-
Internal audit support for P Mark and ISMS.
Improve audit quality and reduce the burden on internal resources! Services for P Mark and ISMS.
last updated
-
Consulting services
A strong ally for those in charge of personal information protection/privacy marks and information security/ISMS!
last updated
-
E-Learning for P Mark and ISMS
For companies that have obtained the P Mark/ISMS, introducing E-Learning for regular training offers significant benefits!
last updated
-
[Video Streaming] Special Release of the Seminar Video Introducing International Standard ISO 42001
Accelerate the use of AI in business! Downloadable materials are also provided.
last updated
-
How will the information security training for ISMS be conducted?
Introduction to practical information security education materials available for free and how to implement them!
last updated
-
What is the cloud security certification that has been frequently heard about lately? <ISMS>
There are many types of cloud security certifications, but let me introduce some representative ones!
last updated
-
A clear explanation of the differences between ISMS and P Mark!
Not only can it reduce the risk of information leakage, but it also contributes to enhancing the company's external credibility!
last updated
-
What is the expiration date for the P mark renewal?
A detailed explanation of the validity period of the P mark, renewal methods, required documents, and how to prepare for expiration!
last updated
-
Thorough explanation of symptoms, countermeasures, and prevention methods in case of malware infection!
Introducing useful information on methods to minimize malware damage!
last updated
-
Frequently Asked Questions
Frequently Asked Questions
last updated
-
The damage and economic losses caused by personal information leaks.
We will also introduce an overview of personal information leaks, how to respond when a leak occurs, and preventive measures!
last updated
-
What about the renewal application after obtaining the P mark?
We will introduce the process for applying for P mark renewal, the necessary documents, the time required until renewal, and the renewal costs!
last updated
-
Security measures necessary for obtaining ISMS.
We will introduce what ISMS is and what benefits it has!
last updated
-
Five key points to prepare before the audit for obtaining ISMS certification.
We will also introduce the aspects to be careful about when building and operating an ISMS!
last updated
-
Explaining Cybersecurity! How is it different from Information Security?
An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!
last updated
-
What is a targeted attack? Is there anything we should do to prepare for emergencies?
For those who want to review their company's security system at this opportunity, we also support obtaining ISMS certification!
last updated
-
Block suspicious emails! What are effective measures against targeted attack emails?
Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!
last updated
-
Explaining the key points of business card management that companies obtaining the P Mark should keep in mind!
Introducing what can be solved with business card management services and tools, along with recommended handling methods!
last updated
-
What rules should companies with P Mark certification follow for password management?
You don't have to change your password regularly, and we will introduce recommended password management methods!
last updated
-
Content and procedures for internal training on the P Mark.
Introducing our E-Learning, which is suitable for education on P Mark and ISMS!
last updated
-
What does "operation verification" in the P Mark mean? What is the difference from "internal audit"?
Introducing how to proceed with operational verification and the items to check during the verification!
last updated
-
What is the information security policy of ISMS? What items are required?
I will introduce you to the alignment with information security objectives and other related matters!
last updated
-
What is ISMS-AC (Information Management System Certification Center)?
I will also explain the differences between the certification of ISMS certification bodies and JIPDEC!
last updated
-
What is a Personal Information Protection Management System (PMS)?
Introducing the relationship between personal information management systems and privacy marks!
last updated
-
What is malware? An explanation of its types, infection routes, and measures that should be taken within companies.
An overview of malware, its types, and measures to prevent infection will be introduced!
last updated
-
Benefits of Introducing E-Learning for Regular Training on P Mark/ISMS!
The introduction of e-learning has many benefits!
last updated
-
What is the typical cost of consulting for obtaining ISMS certification?
Tips for Comparing Service Providers Explained! Introducing the Benefits of Using ISMS Certification Support Services.
last updated
-
What is the duration and required documents for the ISMS audit?
We also explain cases of failing the review and how to deal with them!
last updated
-
What if I get infected with a Trojan horse? How is it different from a virus?
Explaining the differences between viruses and ransomware, as well as measures to prevent infection!
last updated