{"id":49959,"date":"2022-05-17T09:55:54","date_gmt":"2022-05-17T01:55:54","guid":{"rendered":"https:\/\/version-2.com\/?p=49959"},"modified":"2022-05-30T10:42:08","modified_gmt":"2022-05-30T02:42:08","slug":"what-is-iso-27001-and-how-can-it-benefit-your-business","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/05\/what-is-iso-27001-and-how-can-it-benefit-your-business\/","title":{"rendered":"What is ISO 27001 and how can it benefit your business?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"49959\" class=\"elementor elementor-49959\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><span style=\"font-weight: 400;\">The International Organization for Standardization is an internationally known and respected agency that manages and structures standards for various areas, including cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ISO 27001 is a systematic approach to managing confidential company information so that it remains secure. It includes people, processes and IT systems from the application of a risk management process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But why would companies be willing to go through the ISO 27001 certification process? First, to ensure that your cybersecurity program is secure enough. So the certification process looks for weaknesses and adjusts cybersecurity to work for the company, not against it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, compliance with ISO 27001 facilitates the two most important things for every business \u2013 customer and employee trust. Who would choose to buy your service or work for your company if you couldn\u2019t guarantee the security of their private data?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, ISO 27001 certification is a great tool for optimizing your internal workflow, eliminating obsolete processes and driving your business towards continuous improvement. Read on and learn more about the benefits of ISO 27001 compliance for your business.<\/span><\/p>\n\n\n<h2><b>What is the ISO 27001 standard?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">ISO 27001 is actually a set of a dozen standards designed to protect a company\u2019s confidential information assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The International Organization for Standardization considers ISO 27001 the leading information security management standard. During the course of this text, you will know the particularities of the requirements related to the Information Security Management System (ISMS) necessary for compliance with the ISO 27001 standard.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The implementation of ISO 27001 should facilitate the security management of sensitive assets. This could be financial data, staff information, intellectual property files, or data about your business partners. Attending the requirements of this standard should enable the company to protect itself against any loss, theft or unauthorized alteration of its confidential data and any associated risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like any standard, ISO 27001 is not mandatory for companies. However, it is particularly useful when it comes to establishing information security controls. Some companies also use it to show their customers and partners how committed they are to cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In detail, the ISO 27001 standard is designed to protect a company\u2019s information systems by preventing cyber risks. In addition the pattern:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Specifies the information technology protection measures that can be considered by Information Security teams.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevents the risk of intrusion and disaster in computer systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It also disseminates organizational best practices regarding cybersecurity.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All of this is part of the Information Security Management System (ISMS), and applies to information systems and processes as well as to people affected by cybersecurity. This system is a powerful tool for managing risk and anticipating cybersecurity breaches.<\/span><\/p>\n\n\n<h2><b>Why is ISO 27001 compliance important?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While ISO 27001 compliance is not mandatory for any organization, companies may choose to achieve and maintain ISO 27001 compliance to demonstrate that they have implemented the necessary security controls and processes to protect their systems and the confidential data in their possession. .<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Achieving compliance with ISO 27001 is important as a differentiator in the market and as a basis for compliance with other mandatory requirements and standards. An organization that complies with ISO 27001 is likely to be more secure than one without it, and the standard provides a solid framework on which to build many of the security controls required by other regulations.<\/span><\/p>\n\n<h2><b>What are the phases for ISO 27001 compliance?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To get started with ISO 27001 compliance it is essential to understand some of the key concepts of ISO and what they can mean for a company that is looking to implement them.<\/span><\/p>\n<h3><b>Framework<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To be certified by ISO 27001, a company must follow several procedures structured in an Information Security Management System (ISMS):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Precisely define the scope of your ISMS.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct internal audits on information security risks to better ensure data protection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Estimate the probability and impact of each of these possible events, for example by risk mapping.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Design a Risk Treatment Plan based on this mapping.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Write the Declaration of Applicability (SoA), a document through which the general management expresses its commitment to the cybersecurity measures described in the Risk Treatment Plan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Convert the Risk Treatment Plan into an action plan, providing performance indicators and regular updates throughout the ISMS lifecycle.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The main objective of the ISO 27001 regulation is to guide organizations in the creation, implementation and application of an ISMS. This ISMS describes the controls, processes and procedures that the company has implemented to ensure the confidentiality, integrity and availability of the data in its possession.<\/span><\/p>\n<h3><b>Documentation&nbsp;<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To achieve compliance with ISO 27001, an organization must also document the steps that were taken in the ISMS development process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key documentation includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scope of the ISMS<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information Security Policy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information Security Risk Assessment Process and Plan<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information security objectives<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evidence of Competence of Persons Working in Information Security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Results of the Assessment and Treatment of Information Security Risks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Internal Audit Program and Results of Conducted Audits<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evidence from ISMS leadership reviews<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evidence of Identified Nonconformities and Results of Corrective Actions<\/span><\/li>\n<\/ul>\n<h3><b>Process<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">ISO 27001 defines a set of audit controls that must be included in a compliant ISMS. These include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information Security Policies.<\/b><span style=\"font-weight: 400;\"> This control describes how security policies must be documented and reviewed as part of the ISMS.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information Security Organization.<\/b><span style=\"font-weight: 400;\"> Role responsibilities are an important part of an ISMS. This control divides security responsibilities across the organization, ensuring there is clear accountability for each task.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Human Resources Security.<\/b><span style=\"font-weight: 400;\"> This control addresses how employees are trained in cybersecurity when starting and ending roles in an organization, including onboarding, termination, and job changes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Asset Management.<\/b><span style=\"font-weight: 400;\"> Data security is a primary concern of ISO 27001. This control focuses on managing access and security of assets that affect data security, including hardware, software, and databases.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Access control.<\/b><span style=\"font-weight: 400;\"> This control discusses how an organization manages access to data to protect against unauthorized access to sensitive or valuable data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cryptography.<\/b><span style=\"font-weight: 400;\"> This is one of the most powerful tools for data protection. Companies should implement data encryption whenever possible using strong cryptographic algorithms.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Physical and Environmental Security.<\/b><span style=\"font-weight: 400;\"> Physical access to systems can undermine digital security controls. This control focuses on securing buildings and equipment within an organization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Operations Security.<\/b><span style=\"font-weight: 400;\"> Operations security focuses on how the organization processes and manages data. The organization must have visibility and control over the flows of data in its IT environment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Communications Security.<\/b><span style=\"font-weight: 400;\"> Communication systems used by an organization (email, video conferencing, etc.) must encrypt data in transit and have strong access controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Acquisition, Development and Maintenance of Systems.<\/b><span style=\"font-weight: 400;\"> This control focuses on ensuring that new systems introduced into an organization\u2019s environment do not jeopardize the company\u2019s security and that existing systems are maintained in a secure state.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Relationships with Suppliers.<\/b><span style=\"font-weight: 400;\"> Third-party relationships create the potential for supply chain attacks. An ISMS must include controls to track third-party relationships and manage risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information Security Incident Management.<\/b><span style=\"font-weight: 400;\"> The company must have processes in place to detect and manage security incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information Security Aspects of Data Management Business Continuity.<\/b><span style=\"font-weight: 400;\"> In addition to security incidents, the company must be prepared to manage other events (such as fires, power outages, etc.) that could negatively impact security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Conformity.<\/b><span style=\"font-weight: 400;\"> As part of ISO 27001 compliance, the organization must be able to demonstrate full compliance with other mandatory regulations to which the organization is subject.<\/span><\/li>\n<\/ol>\n<h2><b>What are the main benefits of reaching ISO 27001?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are obvious benefits for companies that comply with this standard. This requires actively implementing the necessary measures, processes, and policies for an improved security posture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This reduces the chance of a company experiencing a data breach and, if it does, ensures that the company is fully prepared with incident response and business continuity plans to minimize damage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the key benefits of achieving ISO 27001 compliance.<\/span><\/p>\n\n<h3><b>Data Security Enhancement<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">By implementing the standard, you will understand your own security landscape and the most up-to-date digital defense mechanisms. You\u2019ll learn about data management best practices through an audit of what you\u2019re doing right, but more importantly, what needs improvement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threats that put your organization at risk will be assessed and you will learn how to protect your assets through tactics that involve confidentiality, safeguard and authorization procedures.<\/span><\/p>\n<h3><b>Improvement of Processes and Strategies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">ISO 27001 puts cyber strategy at the forefront of its certification. Qualified auditors seek to address your risks to mitigate security breaches. They map goals and objectives into an actionable approach to defining data security accountability across your team. The certification process will also help you create documentation that can be used as a guide and updated for years to come.<\/span><\/p>\n\n<h3><b>Alignment with Management Systems<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The good news is that ISO 27001 aligns with any current ISO management system you may already have in place. Because this standard fits so easily and has many overlapping clauses with other ISOs, it eliminates the need for constant verification and auditing of all your management systems.<\/span><\/p>\n<h3><b>Culture of Continuous Improvement<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the ever-evolving world of cybersecurity, this is a weight off your shoulders as you are assured that with the help of ISO 27001, you can always meet new requirements and obligations.<\/span><\/p>\n\n<h3><b>Development of a Quality Brand<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Another big advantage of getting ISO 27001 certified is the benefits it does to your reputation. This standard is internationally recognized and externally assured, conveying to the business world that it is a credible and trustworthy organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It will automatically increase customer trust by demonstrating your commitment to cybersecurity and compliance with legislation such as GDPR. This will help you win new business, keeping you ahead of other organizations that are not certified, opening you up to new industries and contacts.<\/span><\/p>\n\n<h2><b>Cost Reduction<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The ISO 27001 standard also helps in implementing policies to organize and improve business processes. This ends up causing a reduction in costs, as a result of the implementation of a good security and management system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By having a clear view of strategic management, it is possible to reduce risks considerably. This ends up saving the company the resources that would be spent on corrections.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This directly influences the company\u2019s cash flow, reducing costs with this type of situation, especially considering that the expenses to resolve any data security issue are always very high.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this way, eliminating the risk of spending on this issue already makes the situation more comfortable for the company. In view of this scenario, it is simple to see why ISO 27001 is so important for companies.<\/span><\/p>\n\n\n<h2><b>Privileged Access Management as a key to ISO 27001 compliance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">ISO 27001 covers a broad scope of information security. The framework includes controls for security policy, asset management, encryption, human resources, environment recovery, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Access control, however, figures prominently in the framework. Specific controls deal with access, but authorization and authentication issues are crucial to almost every aspect of the framework. After all, effective data encryption is impossible if you cannot control who has access to encryption mechanisms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Altogether, ISO 27001 provides 14 controls, five of which may be related to Privileged Access Management (PAM). Let\u2019s investigate them more closely.<\/span><\/p>\n<h3><b>Section A.6 Information Security Organization<\/b><\/h3>\n\n<p><span style=\"font-weight: 400;\">It requires a company to provide a transparent and detailed management framework that regulates and enforces cybersecurity programs. The company must be fully aware of what roles, responsibilities and tasks employees can and actually perform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How can Privileged Access Management (PAM) help? Through the use of access policies and permissions, the software regulates and manages users and their rights and responsibilities. In fact, PAM restricts the ability to perform any unauthorized actions.<\/span><\/p>\n\n<h3><b>Section A.9 Access Controls<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The company must regulate and, if necessary, restrict employee access to different types of resources and information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How can Privileged Access Management (PAM) help? In fact, PAM can control which resources, which time period, and which users access should be granted. It helps to granularly distribute access rights as required by business needs and cybersecurity programs.<\/span><\/p>\n\n\n\n<h3><b>Section A.12 Security of Operations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Regulates the processes linked to the flow and storage of information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How can Privileged Access Management (PAM) help? The solution is capable of tracking any user\u2019s activities, such as attempts to relocate and change company data. It can also log all events, which contributes to faster incident response. In short, these features provide another layer of verification and transparency of data flows.<\/span><\/p>\n\n\n<h3><b>Section A.15 Supplier Relations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Describes the process of secure interaction between the company and third parties (vendor technical support, contractors, remote workers outside the network).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How can Privileged Access Management (PAM) help? To protect the confidential company data from third parties and prevent unauthorized access, the software can define the list of policies that define with clear permissions of third parties within the company\u2019s information systems. In fact, PAM can also track users\u2019 activities.<\/span><\/p>\n\n<h3><b>Section A.16 Information Security Incident Management<\/b><b><\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It controls and verifies how the company can act on alert security events and if response workflows are configured effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How can Privileged Access Management (PAM) help? Using the out-of-the-box event recording mechanisms and video and text recordings of sessions, the software provides a quick way to understand the reason for the incident. By acting immediately, the company can mitigate the consequences of the security incident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, Privileged Access Management can simplify the ISO 27001 certification process because it is a ready-to-use instrument capable of mitigating threats associated with misuse of privileged access and adjusting the internal cybersecurity plan according to the requirements.<\/span><\/p>\n\n\n<h2><b>senhasegura solution for ISO 27001<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard 27001 is an internationally recognized standard for specifying Information Security Management Systems. Complying with this standard helps any organization to meet its obligations to customers and business partners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For service providers, from cloud data centers to law firms, being able to operate requires attesting to their responsibility for their customers\u2019 sensitive information. Auditors around the world also rely on the ISO 27001 standard as the basis for evaluating control and verifying compliance to a range of regulations and standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A PAM solution protects an organization against accidental or deliberate misuse of privileged access, and should be a critical element of an ISMS. The senhasegura solution tracks privileged users, enabling the implementation of ISO 27001 through a secure, centralized and simplified mechanism to authorize and monitor all privileged users for all relevant systems. In addition, senhasegura:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Grants and revokes privileges to users only on systems on which they are authorized.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avoids the need for privileged users to have or need local passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quickly and centrally manage access to a set of heterogeneous systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Creates an unalterable audit trail for any privileged operation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is a critical element of the ISMS, allowing organizations to track every action of privileged users on their IT infrastructure.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Request a demo now and discover the benefits of senhasegura for your company.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The International Organization for Standardization is a [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-49959","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is ISO 27001 and how can it benefit your business? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is ISO 27001 and how can it benefit your business? - Version 2\" \/>\n<meta property=\"og:description\" content=\"The International Organization for Standardization is a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-17T01:55:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"What is ISO 27001 and how can it benefit your business?\",\"datePublished\":\"2022-05-17T01:55:54+00:00\",\"dateModified\":\"2022-05-30T02:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/\"},\"wordCount\":2428,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/\",\"name\":\"What is ISO 27001 and how can it benefit your business? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\",\"datePublished\":\"2022-05-17T01:55:54+00:00\",\"dateModified\":\"2022-05-30T02:42:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/what-is-iso-27001-and-how-can-it-benefit-your-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is ISO 27001 and how can it benefit your business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is ISO 27001 and how can it benefit your business? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/","og_locale":"zh_HK","og_type":"article","og_title":"What is ISO 27001 and how can it benefit your business? - Version 2","og_description":"The International Organization for Standardization is a [&hellip;]","og_url":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/","og_site_name":"Version 2","article_published_time":"2022-05-17T01:55:54+00:00","article_modified_time":"2022-05-30T02:42:08+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"13 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/what-is-iso-27001-and-how-can-it-benefit-your-business\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"What is ISO 27001 and how can it benefit your business?","datePublished":"2022-05-17T01:55:54+00:00","dateModified":"2022-05-30T02:42:08+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/what-is-iso-27001-and-how-can-it-benefit-your-business\/"},"wordCount":2428,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/what-is-iso-27001-and-how-can-it-benefit-your-business\/","url":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/","name":"What is ISO 27001 and how can it benefit your business? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg","datePublished":"2022-05-17T01:55:54+00:00","dateModified":"2022-05-30T02:42:08+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/What-is-ISO-27001-and-how-can-it-benefit-your-business-.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/what-is-iso-27001-and-how-can-it-benefit-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What is ISO 27001 and how can it benefit your business?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cZN","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/49959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=49959"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/49959\/revisions"}],"predecessor-version":[{"id":49963,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/49959\/revisions\/49963"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=49959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=49959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=49959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}