Loading...

Follow Compliance Council Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

A SWOT analysis is a simple and highly effective planning tool for your business. It is something you may have heard of before or already use to an extent. It allows you to generate more oversight and insight of your business internally and externally through which you can set goals to reach your business objectives.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When people hear the term audit, almost immediately people become nervous or sigh at the thought of it. More often than not, perceptions around audits are negative. Benefits of an audit include but not limited to awareness building, identifying areas to boost resources, ensuring obligations are being met, improving operations/work flows. Audits are a tool and we encourage you to embrace this. They are there for you to improve the business, as a means for external parties to gain insight to provide feedback and most importantly to strengthen confidence within your customers and stakeholders. Important things to consider prior to embarking on an audit. What is the objective, what is to be achieved, what is the value to be realised through completing the audit?

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

I've recently taken up sailing as a sport, beginning with a competent crew course through Allsail at Pittwater and I found it to be surprising how many of the lessons are transferable to the workplace. 6 items that crossover from sailing into good business include:

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Introduction

This article is the culmination of four years of working with the Transport for NSW (TfNSW) Authorised Engineering Organisation (AEO) Framework helping organisations with their application and we intend for this to be a guide for other organisations either considering to go through the process or those who already have an application underway.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Guide to Getting Certified to ISO 9001
Companies that want to define the rules and systems they use to consistently produce specific results can rely on a quality management system (QMS). Quality management systems include things like processes, resources, documents, planning, and more, which guide the way you reach your quality goals.
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

ISO 27001 and CSA STAR are both frameworks designed to assess information security, though the latter relates specifically to cloud computing. Though they are designed to achieve similar goals, the two frameworks have some significant structural and procedural differences.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

ISO 27017 is a relatively new publication from the International Organization for Standardization (ISO) dealing specifically with cloud computing.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

ISO 27001 is a standard from the International Organization of Standardization. SOC 2 (Service Organization Control) is a set of compliance requirements created by the American Institute of Certified Public Accountants. Here’s how else SOC 2 differs.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

ISO 27001 and COBIT 2019 are both frameworks dealing with the way organisations manage and oversee their IT systems. The two frameworks operate in different ways, but the big difference between the two is that ISO 27001 relates mainly to security while COBIT 2019 is about IT overall.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When a mobile device comes to the end of its lifespan, it is very important to dispose of it securely. People who get hold of old mobile devices and computers can steal data from them, which can lead to serious problems for the business and its customers. Let’s take a look at how businesses can safely re-use or dispose of old media and equipment.

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview