What is ISO 27001:2022 Certification?

ISO 27001:2022 is the globally recognised standard for Information Security Management Systems (ISMS). It integrates people, processes, and technology to ensure the confidentiality, integrity, and availability of your organisation’s information.

Certification under this standard demonstrates a robust commitment to managing information security risks and helps organisations comply with regulatory frameworks such as GDPR.

ISO/IEC 27001 Certification – Simplified for Your Success

Achieving ISO 27001:2022 Certification is a crucial step toward safeguarding your organisation’s sensitive data, ensuring compliance with international standards, and building trust with your customers. Our platform streamlines the certification process, providing all the tools and resources needed to achieve compliance efficiently and effectively.

Why is ISO 27001:2022 Certification Important?

Certification is a valuable asset that provides several benefits for organisations, including:

1. Increased Trust and Credibility

ISO 27001 certification signals to clients, partners, and stakeholders that your organisation takes information security seriously. It demonstrates that your business has implemented best practices to protect sensitive data and comply with international security standards.

2. Improved Security Framework

An ISMS certified to ISO 27001:2022 systematically manages security risks by integrating organisational, technical, and physical controls. This proactive approach reduces vulnerabilities and enhances your overall security posture.

3. Regulatory Compliance

ISO 27001:2022 helps ensure compliance with legal requirements, such as GDPR and other industry-specific regulations. By aligning your ISMS with this standard, your organisation reduces the risk of fines and legal penalties associated with data breaches.

4. Business Growth and Competitive Advantage

Certification offers a competitive edge in both domestic and international markets. Many B2B clients and partners require ISO 27001 certification as a prerequisite for doing business, especially in sectors such as IT, healthcare, and finance.

5. Cost Savings and Risk Mitigation

By preventing data breaches and improving operational efficiency, ISO 27001 can reduce the costs associated with security incidents, non-compliance fines, and business disruptions.

Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

How to Achieve ISO 27001:2022 Certification

Achieving certification involves a well-structured approach that includes the following steps:

1. Define the Scope of Your ISMS

Clearly identify the areas of your business covered by your ISMS. This should align with your business goals and include all relevant assets, processes, and stakeholders (ISO 27001:2022 Clause 4).

2. Conduct a Risk Assessment

Perform a thorough risk assessment to identify potential threats and vulnerabilities to your organisation’s information assets. Prioritise risks based on likelihood and impact, and develop a risk treatment plan that addresses these risks with appropriate security controls (ISO 27001:2022 Clause 6.1.2).

3. Implement Security Controls from Annex A

Apply tailored security controls to mitigate risks. Annex A of ISO 27001:2022 contains 93 controls covering areas like access management, incident response, and threat detection. These controls should be integrated into daily operations to ensure continuous protection.

4. Prepare for the Two-Stage Certification Audit

The certification process consists of two audits:

  • Stage 1: Review of documentation to ensure all required processes and controls are in place.
  • Stage 2: A more thorough evaluation of your ISMS implementation, where auditors will interview staff and assess real-world application of security controls.

5. Continuous Improvement

Certification is not a one-time event; it requires ongoing surveillance audits and updates to your ISMS. Regular reviews ensure your organisation adapts to emerging threats and maintains compliance over time.


Key Benefits of ISO 27001:2022 Certification

ISO 27001:2022 Certification brings wide-ranging benefits to all stakeholders:

For Your Business:

  • Protect valuable data and intellectual property
  • Enhance your reputation by demonstrating a commitment to security
  • Gain a competitive advantage in B2B markets
  • Attract new clients and retain existing customers through improved trust

For Your Staff:

  • Increased confidence in organisational security
  • Training opportunities to enhance security skills
  • Clear policies and procedures that guide daily operations
  • Pride in contributing to a secure and compliant business environment

For Your Customers:

  • Trust in your ability to safeguard their data
  • Reduced risk of breaches, ensuring continuity of service
  • Lower onboarding costs for clients, particularly in industries that mandate ISO 27001 certification
ISO 27001 Certification benefits for you, your customers and your staff

Maintaining Your ISO 27001 Certification

Achieving ISO 27001:2022 certification is only the beginning of a continuous process to ensure your organisation's information security remains robust and up-to-date. ISO 27001 certification is awarded for a three-year period, but maintaining it requires regular reviews, updates, and audits.

Ongoing Surveillance Audits

After the initial certification, your organisation will need to undergo regular surveillance audits, typically conducted annually. These audits assess whether your Information Security Management System (ISMS) continues to meet the requirements of ISO 27001:2022 and remains effective in managing information security risks.

Auditors will evaluate how well you are maintaining and improving your ISMS in response to evolving risks and changes in your business environment.

Internal Audits and Management Reviews

Your organisation should conduct internal audits at least annually to ensure compliance with the ISMS and identify any areas that need improvement. Regular management reviews are also necessary to ensure that top-level management is involved in evaluating the performance of the ISMS, making any required changes, and setting security objectives for the future.

Continuous Improvement

Maintaining certification is not about staying static; it requires continuous improvement of your ISMS.

As new threats emerge and technologies evolve, your security controls and policies should be updated to reflect the changing landscape. ISO 27001 encourages organisations to adopt a proactive approach to risk management, continually refining security measures to ensure ongoing compliance and protection.

Recertification Every Three Years

Every three years, your organisation will need to undergo a full recertification audit. This process is more comprehensive than the annual surveillance audits, requiring an in-depth review of your ISMS and ensuring it meets all the requirements of the ISO 27001:2022 standard.

Successfully passing this audit will renew your certification for another three-year period.

The Role of ISMS.online in Maintaining Certification

Our platform helps simplify the process of maintaining your ISO 27001 certification. With built-in tools for continuous monitoring, document management, and audit tracking, ISMS.online ensures your organisation is always ready for audits and stays compliant with the latest requirements.

Whether it's internal audits, updating risk assessments, or managing policy changes, ISMS.online provides a structured and efficient approach to maintaining your certification.

By continuously monitoring and improving your ISMS, your organisation will not only maintain its certification but also strengthen its overall security posture, ensuring long-term success and resilience against new threats.

How Many Companies Are ISO 27001 Certified?

ISO 27001 has become the most popular information security standard worldwide, with a growing number of organisations adopting it to protect their sensitive information and comply with international security standards. Since its inception, the number of companies certified to the ISO 27001 standard has steadily increased, reflecting its global importance.

As of recent reports, tens of thousands of organisations across various industries have achieved ISO 27001 certification. Since 2006, there has been a consistent rise in certifications, driven by growing awareness of the importance of information security and the need for compliance with data protection regulations like GDPR.

This widespread adoption underscores the trust that businesses, regulators, and customers place in ISO 27001 certification as a marker of robust security practices.

Below you can see the number of certificates since 2006:

YearISO 27001 Certified Companies
20065,797
20077,732
20089,246
200912,935
201015,626
201117,355
201219,620
201321,604
201423,005
201527,536
201639,501
201733,290
201836,362
201944,486
202058,687
202171,549

Source: The ISO Survey of Management System Standard Certifications

ISO 27001 Certification for Healthcare

Healthcare organisations manage vast amounts of sensitive personal data, including medical records, patient information, and billing details. In an era of increasing cyberattacks and stringent regulatory requirements, such as HIPAA in the U.S. and GDPR in Europe, ISO 27001:2022 certification offers a crucial framework for securing this data.

Why Healthcare Needs ISO 27001

Healthcare organisations face significant risks in protecting patient data and complying with privacy regulations. ISO 27001:2022 ensures that healthcare providers implement robust security controls, from encrypting patient information to managing access to electronic health records (EHRs). By obtaining certification, healthcare organisations can:

  • Reduce data breach risks: ISO 27001’s focus on risk assessment helps healthcare entities identify vulnerabilities and implement strategies to mitigate them.
  • Ensure compliance: Many countries have strict healthcare privacy regulations, and ISO 27001 certification supports alignment with these laws, reducing the risk of fines and legal consequences.
  • Enhance patient trust: As healthcare data breaches rise, patients are increasingly concerned about how their information is handled. Certification demonstrates a commitment to safeguarding personal health data.

Benefits of ISO 27001 for Healthcare

  1. Enhanced data security for patient records
  2. Compliance with regulations like HIPAA and GDPR
  3. Reduction in data breaches and associated costs
  4. Greater trust from patients and healthcare partners

Compliance doesn’t have to be complicated.

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

The financial services industry, including banks, insurance companies, and investment firms, is highly targeted by cybercriminals due to the sensitive financial data they handle. ISO 27001:2022 certification offers a vital framework for protecting these assets while meeting both regulatory and customer expectations.

Why Financial Services Need ISO 27001

Financial services organisations face unique challenges in managing sensitive information, including credit card details, customer data, and confidential transaction records. With regulations such as PCI-DSS and GDPR in place, the need for effective information security measures is more critical than ever. ISO 27001:2022 provides financial institutions with:

  • Improved risk management: By systematically identifying risks and implementing controls, financial services companies can better protect against cyber threats
  • Regulatory compliance: ISO 27001 implementation supports compliance with global regulations, helping organisations meet the stringent demands of financial authorities
  • Customer confidence: Trust is essential in the financial sector. ISO 27001 certification demonstrates to customers and partners that your organisation takes information security seriously

Benefits of ISO 27001 for Financial Services

  1. Stronger protection of financial data
  2. Compliance with regulatory frameworks like PCI-DSS
  3. Increased trust from clients and business partners
  4. Mitigated risks of costly data breaches

ISO 27001 Certification for Small Businesses

ISO 27001:2022 certification is not just for large enterprises; small businesses can also benefit significantly from achieving certification. In fact, with the increasing risk of cyberattacks and data breaches, small businesses are becoming more vulnerable, making information security a top priority. Certification offers a structured and scalable approach to managing security risks, regardless of your organisation’s size.

Why Small Businesses Need ISO 27001 Certification

Small businesses are often perceived as easier targets by cybercriminals because they may not have the same level of security controls as larger organisations. ISO 27001:2022 certification helps small businesses mitigate these risks by implementing a systematic approach to protecting sensitive data. Here’s why it’s especially valuable for small businesses:

  1. Building Trust and Credibility: Certification signals to clients, partners, and stakeholders that your business is committed to protecting information. This can be a key differentiator when competing for contracts, especially in industries that mandate security certifications.
  2. Compliance with Regulations: ISO 27001 certification helps small businesses comply with industry regulations and legal requirements, such as GDPR. Compliance is critical to avoiding fines and maintaining the trust of your customers.
  3. Cost-Effective Risk Management: Implementing ISO 27001 doesn’t have to be costly or resource-intensive for small businesses. The framework is flexible, allowing organisations to scale their ISMS based on their specific needs, risks, and resources. This makes it an efficient and affordable option for small businesses looking to enhance their security posture.
  4. Competitive Advantage: Many larger organisations require their suppliers and partners to get ISO 27001 certified. By achieving certification, small businesses can access new markets and business opportunities that would otherwise be out of reach.

How ISMS.online Supports Small Businesses

ISMS.online simplifies the certification process for small businesses by providing all the necessary tools and resources in one platform. From risk assessments to policy management, our platform offers a streamlined and cost-effective way to achieve and maintain ISO 27001 certification. With user-friendly interfaces and pre-configured templates, even businesses with limited IT resources can confidently manage their ISMS.

Benefits of ISO 27001 for Small Businesses

  • Enhanced protection of sensitive customer data: By identifying and addressing vulnerabilities, small businesses can better protect their clients’ information.
  • Increased trust and credibility: Certification demonstrates that your business takes security seriously, which can help attract new customers and retain existing ones.
  • Compliance with industry regulations: Meeting legal requirements, such as GDPR, ensures that your business avoids costly penalties and maintains a strong reputation.
  • Business growth: Certification can open doors to larger contracts and partnerships that require a commitment to information security.

For small businesses, ISO 27001 certification is a practical way to safeguard their data, comply with regulations, and build trust with stakeholders, all while maintaining a competitive edge in their industry.

How ISMS.online Can Simplify Your Certification Journey

Our platform provides all the tools your organisation needs to achieve and maintain ISO 27001:2022 certification, including:

  • Risk Assessment Tools: Efficiently identify, evaluate, and manage information security risks.
  • Policy Management: Manage and update security policies with built-in templates and version control.
  • Audit Management: Track and prepare for internal and external audits with comprehensive documentation tools.

By streamlining these processes, ISMS.online helps you reduce time and costs associated with certification, making it easier to integrate ISO 27001 into your business strategy.

ISO 27001 Certification Frequently Asked Questions

What Is the Difference Between ISO 27001:2022 Certification and Compliance?

Compliance means your organisation follows the principles of ISO 27001, but certification requires a third-party auditor to verify that you meet all the requirements outlined in the standard. Certification provides an external stamp of approval and often carries more weight in the market.


How Long Does the ISO 27001:2022 Certification Process Take?

The timeline for certification can vary depending on the size and complexity of your organisation, but it generally takes between 6 to 12 months to implement the necessary controls and pass both stages of the audit.


Is ISO 27001:2022 Relevant for Small Businesses?

Yes, even small businesses can benefit from ISO 27001 certification. Many industries require certification to handle sensitive data, and it helps establish trust with clients and partners, regardless of the organisation’s size.


How Much Does ISO 27001 Certification Cost?

Costs vary based on the scope and size of the organisation. Certification audit costs typically range from £1,000 to £5,000 for small to medium-sized businesses. The primary cost is usually the internal time and resources dedicated to implementing the ISMS.


How Does ISO 27001:2022 Align With Other Standards Like ISO 9001?

ISO 27001 can be integrated with other standards like ISO 9001 (Quality Management) and ISO 14001 (Environmental Management) to create a comprehensive, unified management system. This integration helps streamline processes, improve efficiency, and ensure compliance across multiple domains.

Manage all your compliance in one place

ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.

Book a demo

With ISMS.online, you can simplify your ISO 27001:2022 certification process and achieve compliance with confidence. Our platform offers step-by-step guidance to help you through the certification journey.
Get Started Today!

Book a demo and see how our platform can support your certification journey, from initial setup to final audit and beyond.

ISO 27001:2022 certification is a powerful tool for businesses that want to demonstrate their commitment to security, compliance, and risk management. By partnering with ISMS.online, your organisation can streamline the certification process and unlock new opportunities for growth.

Download our whitepaper

The return on investment from an ISO 27001 ISMS can be more fully explored in our whitepaper; Planning the Business Case for an ISMS.

The whitepaper further explores the opportunities and threats, benefits and consequences, and also offers up a range of tools and exercises to help.

Download whitepaper

Jump to topic

Mark Sharron

Mark works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

Related Topics

ISO 27001

An Integrated Approach: How ISMS.online Achieved ISO 27001 and ISO 27701 Recertification

In October 2024, we attained recertification to ISO 27001, the information security standard, and ISO 27701, the data privacy standard. With our successful recertification, ISMS.online enters its fifth three-year certification cycle—we've held ISO 27001 for over a decade! We're pleased to share that we achieved both certifications with zero non-conformities and plenty of learning. How did we ensure we effectively managed and continued to improve our data privacy and information security? We used our integrated compliance solution – Single Point of Truth, or SPoT, to build our integrated management system (IMS). Our IMS combines our information security management system (ISMS) and privacy information management system (PIMS) into one seamless solution. In this blog, our team shares their thoughts on the process and experience and explains how we approached our ISO 27001 and ISO 27701 recertification audits. What is ISO 27701? ISO 27701 is a privacy extension to ISO 27001. The standard provides guidelines and requirements for implementing and maintaining a PIMS within an existing ISMS framework. Why Should Organisations Look to Implement ISO 27701? Organisations are responsible for storing and handling more sensitive information than ever before. Such a high - and increasing - volume of data offers a lucrative target for threat actors and presents a key concern for consumers and businesses to ensure it's kept safe. With the growth of global regulations, such as GDPR, CCPA, and HIPAA, organisations have a mounting legal responsibility to protect their customers' data. Globally, we're steadily moving towards a compliance landscape where information security can no longer exist without data privacy. The benefits of adopting ISO 27701 extend beyond helping organisations meet regulatory and compliance requirements. These include demonstrating accountability and transparency to stakeholders, improving customer trust and loyalty, reducing the risk of privacy breaches and associated costs, and unlocking a competitive advantage. Our ISO 27001 and ISO 27701 Recertification Audit Preparation As this ISO 27701 audit was a recertification, we knew that it was likely to be more in-depth and have a larger scope than a yearly surveillance audit. It was scheduled to last 9 days in total. Also, since our previous audit, ISMS.online has moved HQ, gained another office and had several personnel changes. We were prepared to address any non-compliances caused by these changes, should the auditor find any. IMS Review Before our audit, we reviewed our policies and controls to ensure that they still reflected our information security and privacy approach. Considering the big changes to our business in the past 12 months, it was necessary to ensure that we could demonstrate continual monitoring and improvement of our approach. This included ensuring that our internal audit programme was up to date and complete, we could evidence recording the outcomes of our ISMS Management meetings, and that our KPIs were up to date to show that we were measuring our infosec and privacy performance. Risk Management and Gap Analysis Risk management and gap analysis should be part of the continual improvement process when maintaining compliance with both ISO 27001 and ISO 27701. However, day-to-day business pressures may make this difficult. We used our own ISMS.online platform project management tools to schedule regular reviews of the critical elements of the ISMS, such as risk analysis, internal audit programme, KPIs, supplier assessments, and corrective actions. Using Our ISMS.online Platform All information relating to our policies and controls is held in our ISMS.online platform, which is accessible by the whole team. This platform enables collaborative updates to be reviewed and approved and also provides automatic versioning and a historical timeline of any changes. The platform also automatically schedules important review tasks, such as risk assessments and reviews, and allows users to create actions to ensure tasks are completed within the necessary timescales. Customisable frameworks provide a consistent approach to processes such as supplier assessments and recruitment, detailing the important infosec and privacy tasks that need to be performed for these activities. What to Expect During an ISO 27001 and ISO 27701 Audit During the audit, the auditor will want to review some key areas of your IMS, such as: Your organisation's policies, procedures, and processes for managing personal data or information security Evaluate your information security and privacy risks and appropriate controls to determine whether your controls effectively mitigate the identified risks. Assess yourincident management. Is your ability to detect, report, investigate, and respond to incidents sufficient? Examine your third-party management to ensure adequate controls are in place to manage third-party risks. Check your training programmes adequately educate your staff on privacy and information security matters. Review your organisation's performance metrics to confirm they meet your outlined privacy and information security objectives. The External Audit Process Before your audit begins, the external auditor will provide a schedule detailing the scope they want to cover and if they would like to talk to specific departments or personnel or visit particular locations. The first day starts with an opening meeting. Members of the executive team, in our case, the CEO and CPO, are present to satisfy the auditor that they manage, actively support, and are engaged in the information security and privacy programme for the whole organisation. This focuses on a review of ISO 27001 and ISO 27701 management clause policies and controls. For our latest audit, after the opening meeting ended, our IMS Manager liaised directly with the auditor to review the ISMS and PIMS policies and controls as per the schedule. The IMS Manager also facilitated engagement between the auditor and wider ISMS.online teams and personnel to discuss our approach to the various information security and privacy policies and controls and obtain evidence that we follow them in day-to-day operations. On the final day, there is a closing meeting where the auditor formally presents their findings from the audit and provides an opportunity to discuss and clarify any related issues. We were pleased to find that, although our auditor raised some observations, he did not discover any non-compliance. People, Processes and Technology: A Three-Pronged Approach to an IMS Part of the ISMS.online ethos is that effective, sustainable information security and data privacy are achieved through people, processes and technology. A technology-only approach will never be successful. A technology-only approach focuses on meeting the standard's minimum requirements rather than effectively managing data privacy risks in the long term. However, your people and processes, alongside a robust technology setup, will set you ahead of the pack and significantly improve your information security and data privacy effectiveness. As part of our audit preparation, for example, we ensured our people and processes were aligned by using the ISMS.online policy pack feature to distribute all the policies and controls relevant to each department. This feature enables tracking of each individual's reading of the policies and controls, ensures individuals are aware of information security and privacy processes relevant to their role, and ensures records compliance. A less effective tick-box approach will often: Involve a superficial risk assessment, which may overlook significant risks Ignore key stakeholders' privacy concerns. Deliver generic training not tailored to the organisation's specific needs. Execute limited monitoring and review of your controls, which may result in undetected incidents. All of these open organisations up to potentially damaging breaches, financial penalties and reputational damage. Mike Jennings, ISMS.online's IMS Manager advises: "Don't just use the standards as a checklist to gain certification; 'live and breathe' your policies and controls. They will make your organisation more secure and help you sleep a little easier at night!" ISO 27701 Roadmap – Download Now We've created a practical one-page roadmap, broken down into five key focus areas, for approaching and achieving ISO 27701 in your business. Download the PDF today for a simple kickstart on your journey to more effective data privacy. Download Now Unlock Your Compliance Advantage Attaining recertification to ISO 27001 and ISO 27001 was a significant achievement for us at ISMS.online, and we used our own platform to do so quickly, effectively and with zero non-conformities. ISMS.online provides an 81% head start, the Assured Results Method, a catalogue of documentation that can be adopted, adapted, or added to, and our Virtual Coach's always-on support. Easily ensure your organisation is actively securing your information and data privacy, continuously improving its approach to security, and complying with standards like ISO 27001 and ISO 27701. Discover the benefits first-hand - request a call with one of our experts today.
Read More
ISO 27001

When Ransomware Strikes at Night, How Can Your Organisation Stay Safe?

Ransomware is the cybersecurity story of the past decade. But over that time, adversary tactics, techniques, and procedures (TTPs) have continued to shift according to the continuously evolving arms race between attackers and network defenders. With historically low numbers of victim companies electing to pay their extortionists, ransomware affiliates are focusing on speed, timing, and camouflage. The question is: with most attacks now coming at weekends and in the early hours of the morning, do network defenders still have the right tools and processes in place to mitigate the threat? Financial services organisations, in particular will need an urgent answer to such questions ahead of compliance with the EU's Digital Operational Resilience Act (DORA). From Strength to Strength By one measure, ransomware continues to thrive. This year is set to be the highest-grossing ever, according to analysis of crypto payments to addresses linked to criminality. According to an August report from blockchain investigator Chainalysis, ransomware "inflows" year-to-date (YTD) stand at $460m, up around 2% from the same time last year ($449m). The firm claims this increase is largely due to "big-game hunting" – the tactic of going after fewer large corporate victims that may be more capable and willing to pay larger ransoms. The theory is borne out in one payment of $75m by an unnamed company, to the Dark Angels ransomware group earlier this year – the largest ever recorded. Overall, the median ransom payment to the most common ransomware strains has also surged—from just under $200,000 in early 2023 to $1.5m in mid-June 2024. Chainalysis claims this suggests "that these strains are prioritising targeting larger businesses and critical infrastructure providers that may be more likely to pay high ransoms due to their deep pockets and systemic importance. " The apparent strength of the ransomware ecosystem is more impressive given the law enforcement wins of earlier this year, which seemed to disrupt two major groups: LockBit and ALPHV/BlackCat. Chainalysis claims these efforts have fragmented the cybercrime underground somewhat, with affiliates moving to "less effective strains" or launching their own. This chimes with a Q2 2024 analysis by ransomware specialist Coveware, which claims to have observed an increase in the number of "lone wolf" groups not affiliated with any major ransomware "brand". Many have taken this decision "due to the increasing threat of exposure, interruption, and profit loss associated with 'toxic' ransomware brands," it says. However, the bottom line is that these threat actors are still active. And with payment rates declining from a high of around 85% of victims in 2019 to roughly a third of that today, they are always looking for ways to make their efforts more effective. Timing Is Everything A new report from Malwarebytes' ThreatDown group reveals exactly how they hope to do so. It claims that, over the past year, more ransomware groups have attacked victims on weekends and in the early hours of the morning. The threat team dealt with most attacks between 1 and 5 a.m. local time. The reason is obvious: the threat actors hope to catch an organisation when its IT team is fast asleep or recharging its batteries at the weekend. Further, the report claims that attacks are getting faster. Back in 2022, a Splunk study tested 10 top ransomware variants and found the median speed for encrypting 100,000 files was just 43 minutes, with LockBit the quickest of all at just four minutes. But what Malwarebytes is seeing is an acceleration of the entire attack chain – from initial access to lateral movement, data exfiltration and finally, encryption. That gives bleary-eyed network defenders even less time to respond and contain a threat before it's too late. The report also claims that more malicious actors use Living Off the Land (LOTL) techniques, which use legitimate tools and processes to stay hidden inside networks while achieving these ends. "Recent customer incidents from top gangs such as LockBit, Akira and Medusa reveal that most of the modern ransomware attack chain is now composed of LOTL techniques," it says. How to Mitigate Ransomware Risk in 2024 Big-game hunting attacks may garner most of the headlines, but the truth is that most ransomware victims are technically SMBs. Coveware claims that the median size in Q2 2024 was just 200 employees. So how can these organisations hope to defend against stealthy attacks at night and on weekends? "The only solution is to ensure that those assets are monitored with the same diligence at 1am as they are at 1pm," Malwarebytes senior threat intelligence researcher Mark Stockley tells ISMS.online. "That can be achieved by staffing an in-house Security Operations Centre (SOC) that operates 24/7. But for most organisations, it's more practical and cost-effective to use a third-party service, like Managed Detection and Response (MDR), or to have a Managed Service Provider (MSP) do it." As the DORA era looms, such measures will be increasingly necessary for financial services organisations and their suppliers. Continuous monitoring, 24/7 incident response readiness, robust business continuity planning, and regular testing will all be required to satisfy regulators that resilience is at an appropriate level. Stockley believes best practice standards and frameworks like ISO 27001 can help to get organisations to this point. "Like any standard or framework, ISO 27001 is a means to an end. Organisations can arrive at the level of information security they need without it, but standards and frameworks can act as useful maps to help them get there and stay there," he adds. "The right choice of framework depends on the organisation's level of security maturity. Ultimately, cyber-criminals don't care what certifications you have; they only care if they get stopped."
Read More
ISO 27001

How Utonomy achieved ISO 27001 first time with ISMS.online

Utonomy was created to solve a specific problem: helping gas network operators reduce methane leakage through pressure management. The company has developed innovative technology that automatically optimises the pressure in gas distribution networks, taking into account seasonal and daily variations in demand to deliver a significant reduction in leakage.

The business supplies customers critical to national infrastructure who face stringent regulatory requirements. As such, the Utonomy team knew that achieving ISO 27001 certification was a must to demonstrate the company’s proactive information security stance to customers, stakeholders, and prospects when tendering.

Utonomy already had a basic information security management system (ISMS) in place due to the work the team had done to achieve Cyber Essentials certification. However, they knew that the business needed a more comprehensive ISMS to achieve ISO 27001 certification successfully. The company needed a platform to make ISO 27001 implementation and ongoing compliance as easy as possible.

“We recognised that we were going to need ISO 27001 in terms of our relationships with our customers; the industry was becoming more security aware. We’d done a fair bit of work around Cyber Essentials, but we thought, ‘we’re going to need to step up our game.’”

Steve Lewis, Chief Technology Officer and Chief Information Security Officer at Utonomy

“We’ve got lots of stuff in the trackers because they’re easy to use. It means that the people who need to be [tracking security incidents] aren’t likely to do it somewhere else, like a note in a book or in one of our other systems. And that makes it easier to manage and easier to audit.”

Steve Lewis, Chief Technology Officer and Chief Information Security Officer at Utonomy

Utonomy chose the ISMS.online platform for ISO 27001 compliance and certification, building out all its ISO 27001 policies, trackers and evidence under one roof. Using the platform’s pre-built policy templates as a starting point, Steve and his team expanded on the templates to suit Utonomy’s specific security objectives and ensured they had comprehensive knowledge of the policies and controls making up the organisation’s ISMS.

“The templates gave us a structure, and it was an educational way to look at an acceptable description of a process because when you’re coming in cold, it’s always difficult to know how far you have to go with documentation.”

Steve Lewis, Chief Technology Officer and Chief Information Security Officer at Utonomy

The business migrated product risk documentation into ISMS.online to proactively manage product threats and controls within the platform using the risk register and risk tracking. With the linked work feature, Utonomy mapped over 60 risks and associated controls and can now easily monitor and manage product risks rather than updating documentation manually. 

“In this new form, it will be much easier to update when we launch new product features or product changes. It’ll be a less onerous, daunting task to try and work through the things we need to change.”

Steve Lewis, Chief Technology Officer and Chief Information Security Officer at Utonomy

Read More

ISO 27001:2022 requirements


ISO 27001:2022 Annex A Controls

Organisational Controls


People Controls


Physical Controls


Technological Controls


About ISO 27001


We’re a Leader in our Field

Users Love Us
Leader Winter 2025
Leader Winter 2025 United Kingdom
Best ROI Winter 2025
Fastest Implementation Winter 2025
Most Implementable Winter 2025

"ISMS.Online, Outstanding tool for Regulatory Compliance"

-Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

-Karen C.

"Innovative solution to managing ISO and other accreditations"

-Ben H.

Streamline your workflow with our new Jira integration! Learn more here.