How will an ISMS defend against a phishing attempt?

An Information Security Management System (ISMS), such as one designed around the ISO/IEC 27001 standard, provides a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process. Contact Diversified to help implement, audit and train on your ISMS.

When it comes to defending against phishing attempts, an ISMS incorporates several layers of defense through its comprehensive approach:

1. Policy Development and Implementation

  • Security Policies: An ISMS includes the development of security policies that specifically address phishing and other types of social engineering attacks. These policies establish guidelines for handling emails, links, and attachments from unknown sources.

2. Risk Assessment and Treatment

  • Risk Identification: Regularly assess risks to identify potential vulnerabilities within the organization that could be exploited by phishing attacks.
  • Risk Mitigation: Implement controls to mitigate identified risks, such as deploying advanced email filtering solutions and establishing protocols for sensitive information sharing.

Read more

How to implement ISO 27001

DMSISO provide complete services to help Implementing ISO 27001, the international standard for information security management.  It involves a structured process.  To give you a better idea of the scope of implementing it, here’s are the steps to implement ISO 27001 in your organization:

  1. Management Support and Leadership:
    • Ensure that top management is committed to the implementation of ISO 27001. Leadership support is crucial for the success of the project.
  2. Establish the Information Security Steering Committee:
    • Form a dedicated team responsible for overseeing the implementation process. This committee should include representatives from various departments, including IT, legal, HR, and management.
  3. Scope Definition:
    • Determine the scope of your ISMS (Information Security Management System). Define the boundaries of what is covered by ISO 27001 within your organization.
  4. Risk Assessment and Gap Analysis:
    • Conduct a comprehensive risk assessment to identify information security risks and vulnerabilities.
    • Perform a gap analysis to compare your existing security practices with the requirements of ISO 27001.
  5. Create Information Security Policies and Procedures:
    • Develop a set of information security policies and procedures that align with ISO 27001 requirements. These should cover areas such as access control, data classification, incident response, and more.
  6. Assign Roles and Responsibilities:
    • Define and assign roles and responsibilities for information security within the organization. Ensure that everyone knows their responsibilities regarding information security.
  7. Training and Awareness:
    • Provide training and awareness programs to employees to ensure they understand the importance of information security and their roles in maintaining it.
  8. Risk Treatment Plans:
    • Develop risk treatment plans to address identified risks. These plans should specify how each risk will be mitigated or accepted.
  9. Implement Security Controls:
    • Implement security controls and measures as outlined in your policies and procedures. These controls should address the specific risks and vulnerabilities identified during the risk assessment.
  10. Documentation and Record-Keeping:
    • Maintain accurate records of security incidents, risk assessments, and any other relevant documentation required by ISO 27001.
  11. Incident Response Plan:
    • Create and implement an incident response plan that outlines how the organization will respond to and manage security incidents and breaches.
  12. Internal Audits:
    • Conduct regular internal audits to assess the effectiveness of your ISMS and identify areas for improvement. Audits should be carried out by trained personnel.
  13. Management Review:
    • Conduct management reviews to assess the performance of the ISMS, evaluate the results of internal audits, and make necessary improvements.
  14. Corrective and Preventive Actions:
    • Address non-conformities and weaknesses identified during internal audits and management reviews by implementing corrective and preventive actions.
  15. Certification Readiness:
    • Prepare for an external ISO 27001 certification audit by addressing any remaining non-conformities and ensuring that your ISMS is fully operational.
  16. External Certification Audit:
    • Engage an accredited certification body to perform an external ISO 27001 certification audit. This audit will assess whether your ISMS complies with ISO 27001 requirements.
  17. Certification and Continual Improvement:
    • Upon successful completion of the external audit, your organization will receive ISO 27001 certification. Continue to monitor, measure, and improve your ISMS to maintain compliance and enhance security.
  18. Review and Update:
      • Regularly review and update your information security policies, procedures, and controls to adapt to evolving threats and business needs.

ISO 27001 implementation is an ongoing process, and it requires a commitment to continual improvement and vigilance to protect sensitive information.  DMSISO’s support and guidance engages all employees in maintaining information security and to cultivate a culture of security awareness throughout the organization.

Compare ISO 27001 with NIST SP 800-115

ISO 27001 and NIST SP 800-115 are two different standards related to information security.

ISO 27001: ISO 27001 is an internationally recognized standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability. The standard is part of the ISO/IEC 27000 family, which covers various aspects of information security.

Key features of ISO 27001:

  • Focuses on establishing, implementing, maintaining, and continually improving the ISMS.
  • Emphasizes risk assessment and risk treatment processes to identify and address security risks.
  • Requires the definition of security policies, objectives, and controls based on risk assessment.
  • Encourages a process-based approach to information security management.
  • Suitable for any organization, regardless of its size or industry.
  1. NIST SP 800-115: NIST SP 800-115, also known as the “Technical Guide to Information Security Testing and Assessment,” provides guidelines for conducting technical security testing and assessments of information systems. It is aimed at IT professionals and security practitioners who want to evaluate the security posture of their systems.

Read more

What is an ISO 27001 Gap Analysis?

An ISO 27001 Gap Analysis is a systematic assessment conducted to identify any gaps or deficiencies in an organization’s information security management system (ISMS) when compared against the requirements outlined in the ISO 27001 standard. The purpose of this analysis is to evaluate the organization’s current state of information security practices, policies, procedures, and controls, and to determine areas where improvements or enhancements are needed to achieve compliance with ISO 27001.

The Gap Analysis typically involves the following steps:

  1. Establishing the Scope
  2. Familiarization with ISO 27001
  3. Documentation Review
  4. Gap Identification
  5. Gap Analysis Report
  6. Recommendations
  7. Action Plan
  8. Implementation
  9. Follow-up Assessment

Read more

What are the benefits to an ISO 27001 audit?

In today’s digital age, information security is paramount. Businesses of all sizes must protect sensitive information from cyber threats, data breaches, and other security risks. One way to achieve this is by implementing an Information Security Management System (ISMS) that conforms to ISO 27001. In this article, we will discuss ISO 27001, its benefits, and why businesses should consider implementing it.

What is ISO 27001?

ISO 27001 is an international standard that sets out the requirements for an Information Security Management System (ISMS). It is a framework for managing and protecting sensitive information, such as personal data, financial information, and intellectual property. ISO 27001 provides a systematic and proactive approach to managing information security risks, ensuring that businesses can protect their critical assets.

Benefits of ISO 27001

1. Protection of Sensitive Information

Read more

Helping you understand and implement your ISMS

Diversified Management Systems provides ISMS Solutions to our clients.  We help you meet your information security objectives faster and ensure security for you and your customers. In the final analysis we save time and money, using our customer-centric approach to implement a management system leveraging our experience and your leadership.

We learn your business goals and market requirements to streamlined ISMS implementation.  We help educate you about the boundaries and scope of ISO 27001 requirements.

  • Prepare a GAP analysis and Risk Assessment
  • Initiate the Information Security Management System
  • Develop the ISMS and move to Certification

No matter the size of your organization, there is only so much that is needed to obtain ISO 27001 certification and we work to understand your business objectives and why you are pursuing ISO 27001. With that information, we focus our efforts on meet your goals and objectives. We will make suggestions for improving your information security management system.  Our value comes by meeting your objectives in the shortest time possible.

Contact us to schedule an introductory meeting and to answer any of your questions or concerns.

ISO 27001 Requirements

The main requirements are found in clauses 4 through 10. Below are a summary of each:

Clause 4 – Context of the organization

Implementing an Information Security Management System successfully requires an understanding the context of the organization. External, internal issues, and interested parties, need to be identified and addressed. Typical requirements include:

  • regulatory issues
  • competition
  • cultural
  • political
  • strategic direction
  • internal capabilities

Given the context, the organization must define the scope of ISMS.

Clause 5 – Leadership

The requirements of ISO 27001 for leadership are many and various. The commitment of upper management is mandatory and essential. The ISMS objectives must be developed in concert with the strategic direction and objectives of the organization. Management must provide the necessary resources, as well as support personnel in their responsibilities with the ISMS.

In addition, upper management must establish a top-level policy for information security. These policy statements need to be documented and communicated within the organization and to all interested parties.

Roles and responsibilities need to be assigned, to meet the requirements of the ISO 27001 standard and to report on the performance of the ISMS.

Clause 6 – Planning

Risks and opportunities should be accounted for during planning. A risk assessment for an ISMS provides a foundation on which to build. Objectives from the risk assessment must be aligned with the company`s overall objectives, and need to be adopted within the company. The objectives provide the security goals to work toward. From the risk assessment and the security objectives, a risk treatment plan is derived using the controls in Annex A.

Clause 7 – Support

The key areas for support include:

    • Resources,
    • competence of employees,
    • awareness,
    • communication
    • documentation

Information needs to be documented, created, and updated, as well as controlled. A series of documentation, including a communications plan, must be maintained in order to support the success of the ISMS.

Clause 8 – Operation

Processes used to implement information security are wheels to the ISMS. These processes must be planned, implemented, and controlled. The risk assessment and objectives have to be put into action.

Clause 9 – Performance evaluation

The requirements of the ISO 27001 standard necesitiate monitoring, measurement, analysis, and evaluation of the Information Security Management System. Key performance indicators must be created and monitored. Internal audits are conducted on a regular and scheduled basis to check the success of the implementation. Upper management needs to review the organization`s ISMS and ISO 27001 KPIs frequently at first, then on a scheduled basis.

Clause 10 – Improvement

After evaluation improvement follows. During an audit nonconformities are documented. They then need to be addressed through an action plan resulting their elimination. A process for continual improvement should be documented and implemented. The traditional PDCA (Plan-Do-Check-Act) cycle is recommended. It provides a solid structure and fulfills the requirements of ISO 27001.

Annex A Information security controls reference

This Annex provides a list of 93 controls that can be implemented to decrease risks and comply with security requirements from interested parties. The selected controls that are implemented must be designated in the Statement of Applicability.


ISMS and Social Engineering

The human element is a key driver of 82% of information and IP breaches.  This emphasizes the importance of having a strong security awareness program.

Social engineering is used for a range of malicious activities through human interactions. It uses psychological manipulation to trick users into giving away sensitive information.

Social engineering attacks happen occur in one or more steps.  The perpetrator learns about the victim to gather background information, such as points of entry and weak security protocols. The attacker moves to gain the victim’s trust and provide positive reinforcement for further actions that break security.

The types of Social Engineering are:

  • Baiting
  • Phishing
  • Spear phishing
  • Scareware
  • Pretexting


These attacks use a false promise to entice a victim’s greed or curiosity. They lure the victim into a trap to steal personal information then inflicts their systems with malware.


These scams are email and text messages aimed at creating a sense of urgency, curiosity or fear. It then moves them into revealing sensitive information, clicking on links to malicious websites, or opening attachments containing malware.

Spear phishing

This is a more targeted version of the phishing scam. The attacker chooses specific individuals. They tailor the messages based on characteristics, job positions, and contacts belonging to their victims to make their attack less conspicuous. Spear phishing requires much more effort on behalf of the perpetrator and may take weeks and months to pull off. They’re much harder to detect and have better success rates if done skillfully.


Scareware involves bombarding the victim with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no real benefit or is malware itself.


The attacker starts by developing trust with the victim by impersonating co-workers, police, bank and tax officials, or other persons who have right-to-know authority. The pretexter asks questions that required to confirmation of the victim’s identity, where they gather important personal data.


Experienced ISO 27001 Consultant

Most think information security is a technology problem to solve. Often we think anything pertaining to securing information or protection from cyber attacks is only for the I.T. team. Nothing could be further from the truth.

Every member of the organization is responsibility for carrying out the Information Security policies. All employees are a part of the ISMS. If you do not train them properly, your organization is open for exploit. Every employee is a vital part of your defense. They are also a significant vulnerability.

When looking for an ISO 27001 consultant it is critical that you find one with experience.  Our main ISO 27001 consultant has experience with the U.S. Armed Forces securing classified material.

From the International Standards Organization, “ISO/IEC 27001:2022 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2022 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.”

In today’s world information and information system security can be as important as cash flow.  If you loose it, you could perish.

Contact us today.