Want to achieve ISO27001 certification but struggling to make headway? Computer One has you covered.

Information Security certification. A mature male looks confused as he reads reams of paper that are the ISO27001 standard.

Many established organisations find it challenging to match their current security policies with ISO27001 standards. Without expert guidance, they worry about needing to overhaul their security systems completely. This concern can lead to inaction.

That’s where Computer One can help. Read on…

Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?

Best practice Disaster Recovery (DR) and Business Continuity (BC) Planning. A man with Asian features prepares for a disaster. He has a bandanna and a military backpack. He is holding a keyboard in one hand and wearing a business suit and tie as well.

Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance.  In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.

Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.

Going to market for a new ICT partner?  Here’s a useful RFP template with step-by-step instructions

Switching ICT Provider? Use our RFP Template. A female decision-maker looks off camera, pondering a switch.

If you’re about to go to market for a new ICT partner, you can increase your chances of making a good selection by starting with our free RFP template.

Written with non-IT people in mind, the document is full of time-saving tips that will help you produce a professional-quality briefing for potential service providers and save thousands on the cost of a professional RFP writer.

A breach of your systems is highly likely. How will your organisation detect and respond to it?

A system breach is highly likely. How will you detect and respond to it? A worker in his 30's looks around an office that has been compromised by malware.

These days a breach of your systems is no longer unthinkable. Now the battleground has shifted to early detection and response. Two technologies can assist you to defend your network: EDR and SIEM. Discover their essential features and how they work together to dramatically improve your security posture and ability to detect and respond to a breach.

“Are we there yet?”  How an independent evaluation of your Technology Roadmap can shave years off realising your goals

IT Roadmap - a winding road with a pin from a map is juxtaposed with the text "are we there yet?"

An independent review of your Technology Roadmap ensures alignment with evolving business needs, provides fresh insights, and mitigates biases, bolstering board and CEO confidence and accelerating the attainment of your IT goals.