Blog

Why ISO 27001:2013 Certification for your Software Vendor should be important to you?

June 30, 2017

Software and Network Security has taken a new dimension as never before! Software and Network Security can be a demon when not tamed, giving sleepless nights, service interruption and causing severe damage to any business. At the same time, it can be a soothing musical note when harnessed with systematic implementation of 27001:2013. What is ISO/IEC 27001:2013 and what does it mean to you ISO/IEC 27001:2013 (ISO 27001) is the International Standard that describes best practice for an ISMS (Information Security Management System). Achieving accredited certification to ISO 27001 demonstrates that a company is following information security best practice, and delivers an independent, expert assessment of whether your data is adequately protected. A typical vendor can claim that it follows the standard to give you a peace of mind but there is more to it. A Vendor’s claim of compliance to best practice is only a small part of the story... Almost any vendor can claim to have a sound and secure environment and I am not implying that their claims are not genuine. They may think so but their claim lacks one important component; verification. Certification to a well tried and tested standard such as ISO 27001:2013 offers assurance to our clients that our internal processes meet the rigorous levels required by the standard. The independent certification bodies have keen eyes and draw on a rich set of experience to identify anomalies and test the organisational practices within the context of modern security standards.  This was the challenge accepted by Tickit Systems. We opened up our management processes, software development methodology, deployment disciplines, backup procedures, security measures and BCP policy to objective scrutiny by undergoing the certification process. And the good news is that Tickit Systems is now ISO 27001:2013 certified company and ever-ready to share your success story.

Business Impact Analysis

July 24, 2014

The first pillar of our Business Continuity Management System  In the previous blog, we established that Business Continuity Planning (BCP) is not a subset of ISO 31000. BCP starts with the p...

Is Business Continuity Plannin...

March 28, 2014

Many organizations consider Business Continuity Planning (BCP) as an extension of Enterprise Risk Management (ERM) or more specifically another risk category within ERM. If your organization subscribe...

Implementing a Risk IT solutio...

September 12, 2012

The RMIA NSW Chapter Event is hosting an event called 'Managing The Risk of Implementing Risk IT Solutions' on   Tuesday, September 18, 2012  5:30 PM to 7:30 PM  KPMG Offices  10 Shelley ...

Braving wet and wild sydney we...

March 2, 2012

Two of Tickit System's own Kim Wilson and Leesa Collet are braving a cold, wet and miserable Sydney day for a fantastic cause. Kim and Leesa are walking the 50km Sydney Coastrek from Palm Beach to Bal...

University of Newcastle choose...

November 18, 2010

The University of Newcastle has chosen Tickit On Demand as their Risk and Compliance Software. Managing Director of Tickit Systems Pty. Ltd. said "We are delighted to have the University of...

Department of Treasury and Fin...

August 13, 2009

Tickit Systems welcomes The Department of Treasury and Finance Western Australia as aTickit On Demand user.Managing Director of Tickit Systems said "This opportunity to work with the Department of Tre...