All products and services
91~120 item / All 284 items
-
What is a clear desk/clear screen?
The basics of information security measures! The first step as a cost-free safety management measure.
last updated
-
What should you do if you get infected with ransomware?
Explaining the measures that should be taken within the company first! Introducing what to do first if infected.
last updated
-
What is ransomware? A clear explanation of infection routes and countermeasures.
We also support those who wish to review their company's security system by obtaining ISMS certification.
last updated
-
What is the Privacy Mark?
Explanation of the 'Certificate of Assurance Regarding Personal Information Protection' and its effects!
last updated
-
Key Points for Acquiring P Mark in a Web Development Company
Explaining the benefits of a web production company obtaining a P Mark, as well as the personal information it holds and how it is handled!
last updated
-
What about the renewal application after obtaining the P mark?
How do I apply for renewal after obtaining the P mark? An explanation of the renewal application process and costs.
last updated
-
What is a targeted attack? What should be done in preparation for emergencies?
A detailed explanation of targeted attacks, one of the attack methods aimed at information assets!
last updated
-
Purpose, implementation methods, and actual flow of internal audits [P Mark]
We will also introduce the benefits of hiring a specialized consultant for internal audits for personal information protection!
last updated
-
Block suspicious emails! What are effective measures against targeted attack emails?
Introducing key points to keep in mind to prevent your valuable information assets from being stolen.
last updated
-
What does the "Personal Information Protection Audit Officer" appointed for obtaining the P Mark do?
An explanation of the individuals who can become personal information protection audit officers and specific check items (business content).
last updated
-
Security measures necessary for obtaining ISMS.
I will explain what ISMS is and what benefits it has!
last updated
-
What companies with P Mark certification should know about the overseas transfer of personal information.
Trends in personal information protection laws overseas! Introducing key points and standards to keep in mind.
last updated
-
A current consultant explains in detail the costs associated with obtaining a new P Mark certification.
We will also introduce the duration required to obtain the P mark and what to do if you become non-compliant!
last updated
-
Operational Status Checklist for Internal Audit of P Mark
Why is a checklist for internal audits of the P Mark necessary? We will also introduce the items to check!
last updated
-
Is obtaining a P mark necessary for an e-commerce site business? Important aspects of site management.
The P mark plays an important role in operating an e-commerce site that is chosen by customers!
last updated
-
[P Mark New Examination Standards] Key Points to Keep in Mind for New Acquisition
A reference for creating regulations! An explanation of the significantly revised P Mark examination criteria.
last updated
-
How should I handle business cards in relation to the P mark?
What can be solved with business card management services and tools! An explanation of recommended handling methods.
last updated
-
What rules should companies with a P mark follow for password management?
Recommended password management methods and poor password management methods, explained with specific examples!
last updated
-
I want to consult about acquiring and managing the P Mark! How to choose a consulting company.
Let's choose a consulting company that is experienced and attentive!
last updated
-
What are the steps for a company that has obtained a P mark to implement telework?
Explanation of the P mark review in the case of remote work!
last updated
-
How far does personal information go under the P Mark? Specific examples by industry.
There are also industry-specific personal information that is subject to protection! Examples from the telecommunications industry and hospitals are introduced.
last updated
-
Explaining how to establish a system for internal audits [ISMS]
I will explain the flow of internal audits, the conditions for those in charge, and the work of the person in charge!
last updated
-
What is the cloud security certification that has been frequently heard about lately?
Which companies should acquire it? An introduction to cloud security certification.
last updated
-
How to promote the ISMS certification mark on business cards.
Seven important points to know when using it! Explained in an easy-to-understand way for beginners.
last updated
-
Flow and methods of managing entrusted parties.
Supplier management (outsourcing management) is important for protecting the company's information assets!
last updated
-
Should you use ISMS certification acquisition support services? Tips for comparing vendors.
Introducing the benefits of using our ISMS certification support services and the flow of our services!
last updated
-
What is the difficulty level of obtaining ISMS certification? Let's consider it from four points.
ISMS certification is difficult! Here are four points that make it easy to get discouraged, such as the complexity of information assets.
last updated
-
Explanation of the period and schedule for obtaining ISMS!
It's difficult to establish a timeline! Here are some common pitfalls for beginners and their solutions.
last updated
-
Five Key Points to Prepare Before the ISMS Certification Audit
Introducing the advantages and disadvantages of obtaining certification and five key points to prepare!
last updated
-
What are the characteristics of industries that have obtained ISMS? What should be noted?
Answering various questions! I will explain clearly from the perspective of a professional who has seen many different sites.
last updated