Information Shield, Inc

image
4.50
Based on 4 Reviews

5

75.00%

4

0.00%

3

25.00%

2

0.00%

1

0.00%
About Information Shield, Inc

We help companies quickly build, deliver and validate a defensible cyber security program. Streamline compliance with any framework (ISO-27002, NIST CSF, HIPAA) or external audits (CMMC, SOC II or ISO 27001. Comply with Cyber Laws. Pass vendor assessments. Save money on cyber breach insurance. All in one package. Backed by our #1 security policy template library, Information Shield is trusted by over 10,000 organizations in 60 countries.

Tags

You need to Login first to submit your review.

image
Troy
GB

First Hand Experience We have been working with Dave Lineman for many years. We went from having no formal IT policies to a robust Written Information Security Program (WISP). Dave was also instrumental in helping us with some of our most difficult IT compliance reviews.

image
Tom Hudson
GB

Information Shield has helped my… Information Shield has helped my business to become compliant with various information security requirements imposed by our clients.

image
IRM Consulting & Advisory
CA

Perfect Product for Small Companies and… Perfect Product for Small Companies and StartUps with minimal budget.

image
Marc Sargent
CA

Could Use Some Work I liked the policy coverage and organization of topics. I didn't like the number of typos, grammar mistakes and inconstancies between the documents. This project really needs a good editor to make it more useful. Otherwise your customers need to read everything very carefully and correct all your mistakes before using the policies. Some of the content needs an update to include modern technologies (more about 2FA and MFA - including biometrics like finger scans and facial recognition), less about fax machines, PDAs and printer ribbons). The organizational roles are named inconsistently throughout. Discussions of the same topic (e.g., shredding of paper documents) are described differently in different policies. The Information Classification Policy, which in many ways is a core element of this system, needs some more thought and is inconsistent. For example, the four categories listed include one called "UNCLASSIFIED"; however, the descriptions in the following paragraphs refer to "PUBLIC" instead. In which category is PII included? The Information Security Program Policy document says policy documents should be classified as "CONFIDENTIAL - Internal Use Only" but that's not one of the categories and the Information Classification Policy states they should be classified as "PRIVATE". Which is correct? I suggest adding a Roles and Responsibilities section to each policy. This system seems like it was designed for large organizations (based on the number of roles and internal groups described). Please consider adding advice for adapting this system to a smaller organization (e.g., with 10 or fewer staff). Small organizations are expected by their clients to have the same policy coverage as large organizations.

We may use cookies or any other tracking technologies when you visit our website, including any other media form, mobile website, or mobile application related or connected to help customize the Site and improve your experience. learn more

Allow