Information Security Content Library

LRQA has a number of freely downloadable content to help you understand the organisational benefits of IT services and information security related management systems.

Our tools have been developed by our internal technical experts. Content available for download include datasheets, interviews, webinars, case studies and independent research.

Guides

A Comprehensive Guide to ISO 27001

Whether you manage internal information management systems, are responsible for information security or develop IT products and services for your customers, effective information security management systems (ISMS) are essential. They will help ensure you develop the right controls, systems and products to meet the ever increasing and demanding requirements of your customers and partners.

Download Guide ►


Top 5 ways your employees get hacked and how to prevent them

Our reliance on the internet and data connectivity makes it difficult to imagine life without it. Research shows that on average we spend 6.7 hours a day online, and with the proliferation of the Internet of Things, chances are few of us are keeping pace with the information we share and how we share it.

LRQA cyber security experienced cyber security assessors collated together the top five ways employees can get hacked, and simple habits employees can implement to strengthen your organisation’s resilience to the threat of cyber attacks.

Download Guide ►

Datasheets

ISO/IEC 27001:2013 Datasheet

ISO 27001 is the international standard that sets out the requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS) within the context of the organization.

Download this datasheet to understand what is ISO 27001 ►

Whitepapers

ISO 27001: Reduce your exposure to information security threats.

Information is one of the most valuable and business-critical assets for any organisation. In today’s hyperconnected world, organisations are exposed to large scale information security threats and cyber-attacks that are more sophisticated and destructive than ever before. Having an effective information security strategy in place has never been more important.

Download Now! ►