Blog

News about information & data security, as well as about TEN Information Management GmbH

A few weeks ago, I attended a blind dinner.A full menu – served in complete darkness. Everything was there: food, drinks, cutlery, service.Just not visible. Suddenly, completely new questions arose:How do I drink without knocking...
“IT takes care of security.”One of the most common and dangerous misconceptions in companies. Information security is not an isolated IT project.It is a company-wide management issue. So who is actually responsible?Information security protects the...
Recently at an NIS 2 workshop with a client’s management team.Topic: Reporting requirements for IT security incidents. The central BSI portal for reporting security incidents has recently been launched – which is good and right....
In recent weeks, I have heard the same thing repeatedly in conversations with customers: The industry surrounding NIS-2 and ISO 27001 is currently a gold mine, and many are acting accordingly. The general sentiment can...
About a year ago, a prospective customer said to me:“You know, Mr. Neeff, everything we need for our ISO 27001 ISMS documentation is now available for free on the internet. And I’ll do the rest...
Many believe that the core of effective information security lies in a particularly “good” or “beautiful” implementation of ISO 27001 or NIS-2. But the real success factor is something else: an honest assessment of the...
As the threat escalates, a publicly traded corporation continues to cut corners on IT security, relying on hope rather than defense. The CISO? No influence. No budget. No team. Now the few employees are sick,...
Anyone involved in setting up and operating management systems—such as for information security in accordance with ISO 27001 (ISMS) or quality management in accordance with ISO 9001—is all too familiar with the scenario: Pages and...
I receive many emails and LinkedIn in-mails—mostly from people who promise me the moon. They claim to have “cracked the LinkedIn code” and can help me gain lots and lots of new customer relationships in...
Platforms such as Mandiant, Recorded Future, and CrowdStrike Falcon Intelligence promise to provide information about the current threat situation in near real time. Many of these tools deliver comprehensive reports and are used by numerous...