Certification Proof of compliant application
If trust is good, but control is perhaps still a little better – we are doing everything right with the current certification. And we can say here and now, and not without pride, that in January of this year we successfully installed an Information Security Management System (ISMS) in accordance with ISO / IEC 27001:2013 and provided proof of its compliant application.
On the one hand, this may be self-evident and not to be expected otherwise – on the other hand, such audits evaluate the effectiveness of the company's own management system and observe the continuous optimization of processes within the company. Thus, they force concentration and focus on the daily and mundane and sensitize anew, with a foreign view, so to speak, for the importance and significance of rule-compliant systems. Our certified credentials have been for the development, operation, support, training and consulting of software solutions and processes – a broad field.
Perhaps the best thing about it: we make ourselves aware of how high our standards are for IT, information and data security and implement regular self-monitoring. In this way, of course, we gradually become even better... And we already meet the target, the principle of continuous improvement of processes and documentation – after the audit is before the next one... We keep you informed.