All products and services
31~60 item / All 291 items
-
What rules should companies with P Mark certification follow for password management?
We will also introduce the necessity of regularly changing passwords and points to be careful about in management!
last updated
-
What is internal audit in the P Mark?
We also introduce recommended qualifications for security personnel! Please use this as a reference for obtaining qualifications.
last updated
-
What constitutes personal information under the P Mark? Specific examples by industry.
We will also introduce sensitive personal information in the context of personal information protection!
last updated
-
Explanation of the period and schedule for obtaining ISMS.
We will also introduce tips and tricks for achieving project success!
last updated
-
How much does it cost to obtain ISMS (ISO 27001)?
We will also introduce consulting fees and security measures costs!
last updated
-
What are the points to note when using the Privacy Mark logo? <P Mark>
We will also introduce an overview of the logo, the design concept, and the correct usage!
last updated
-
Advantages and disadvantages of obtaining ISMS (ISO 27001)
We will also introduce the construction and operation of ISMS! Please use this to assist you in preparing for strengthening information security.
last updated
-
Targeted Attack Email Exercise
The ultimate weapon against ransomware! Experience simulated email attacks to raise employee awareness.
last updated
-
Internal audit support for P Mark and ISMS.
Improve audit quality and reduce the burden on internal resources! Services for P Mark and ISMS.
last updated
-
Consulting services
A strong ally for those in charge of personal information protection/privacy marks and information security/ISMS!
last updated
-
E-Learning for P Mark and ISMS
For companies that have obtained the P Mark/ISMS, introducing E-Learning for regular training offers significant benefits!
last updated
-
[Video Streaming] Special Release of the Seminar Video Introducing International Standard ISO 42001
Accelerate the use of AI in business! Downloadable materials are also provided.
last updated
-
How will the information security training for ISMS be conducted?
Introduction to practical information security education materials available for free and how to implement them!
last updated
-
What is the cloud security certification that has been frequently heard about lately? <ISMS>
There are many types of cloud security certifications, but let me introduce some representative ones!
last updated
-
A clear explanation of the differences between ISMS and P Mark!
Not only can it reduce the risk of information leakage, but it also contributes to enhancing the company's external credibility!
last updated
-
What is the expiration date for the P mark renewal?
A detailed explanation of the validity period of the P mark, renewal methods, required documents, and how to prepare for expiration!
last updated
-
Thorough explanation of symptoms, countermeasures, and prevention methods in case of malware infection!
Introducing useful information on methods to minimize malware damage!
last updated
-
Frequently Asked Questions
Frequently Asked Questions
last updated
-
The damage and economic losses caused by personal information leaks.
We will also introduce an overview of personal information leaks, how to respond when a leak occurs, and preventive measures!
last updated
-
What about the renewal application after obtaining the P mark?
We will introduce the process for applying for P mark renewal, the necessary documents, the time required until renewal, and the renewal costs!
last updated
-
Security measures necessary for obtaining ISMS.
We will introduce what ISMS is and what benefits it has!
last updated
-
Five key points to prepare before the audit for obtaining ISMS certification.
We will also introduce the aspects to be careful about when building and operating an ISMS!
last updated
-
Explaining Cybersecurity! How is it different from Information Security?
An explanation of the types of cyber attacks and how cybersecurity is the key to protecting a company's trust and future!
last updated
-
What is a targeted attack? Is there anything we should do to prepare for emergencies?
For those who want to review their company's security system at this opportunity, we also support obtaining ISMS certification!
last updated
-
Block suspicious emails! What are effective measures against targeted attack emails?
Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!
last updated
-
Explaining the key points of business card management that companies obtaining the P Mark should keep in mind!
Introducing what can be solved with business card management services and tools, along with recommended handling methods!
last updated
-
What rules should companies with P Mark certification follow for password management?
You don't have to change your password regularly, and we will introduce recommended password management methods!
last updated
-
Content and procedures for internal training on the P Mark.
Introducing our E-Learning, which is suitable for education on P Mark and ISMS!
last updated
-
What does "operation verification" in the P Mark mean? What is the difference from "internal audit"?
Introducing how to proceed with operational verification and the items to check during the verification!
last updated
-
What is the information security policy of ISMS? What items are required?
I will introduce you to the alignment with information security objectives and other related matters!
last updated