{"id":530,"date":"2023-05-29T15:32:56","date_gmt":"2023-05-29T15:32:56","guid":{"rendered":"http:\/\/148.76.139.49\/qci-global\/?page_id=530"},"modified":"2023-06-23T17:13:42","modified_gmt":"2023-06-23T17:13:42","slug":"information-security","status":"publish","type":"page","link":"http:\/\/148.76.139.49\/qci-global\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\n<section class=\"info\">\n         <div class=\"container\">\n            <div class=\"row\">\n               <div class=\"col-md-12\">\n                  <h1>Information Security<\/h1>\n                  <p class=\"highlighted\">Information and cybersecurity, refers to the practices and measures taken to protect digital information from unauthorized access, use, disclosure, disruption, modification, or destruction.<\/p>\n                  <p>Information security applies to various types of information, regardless of the format in which it is stored or transmitted. Information security encompasses the protection of information throughout its lifecycle, including processing, storage, transfer, archival, and destruction stages.<\/p>\n               <\/div>\n            <\/div>\n         <\/div>\n      <\/section>\n\n\n\n<section class=\"darkBg text-white\">\n         <div class=\"container postionRelative\">\n            <div class=\"row\">\n               <div class=\"col-md-6\">\n                  <div class=\"yellowOuterLine yellowBg\"><\/div>\n                  <div class=\"imageStandardThumb\"><img decoding=\"async\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/information-security.jpg\" alt=\"\" class=\"imgResponsive\"><\/div>\n               <\/div>\n               <div class=\"col-md-6\">\n                  <div class=\"middleContentOuter\">\n                     <div class=\"verticalMiddle\">\n                        <h2 class=\"textYellow\">65% of Consumers View Data Privacy as the Most Important Attribute When Considering Trust<\/h2>\n                        <p>Certification is a crucial way for organizations to demonstrate their commitment to information technology (IT) security and information and communication technology (ICT) governance.<\/p>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div>\n      <\/section>\n\n\n\n<section class=\"postionRelative mb-0\">\n         <div class=\"container\">\n            <div class=\"row\">\n               <div class=\"col-md-12\">\n                  <h2>Information Security Standards &amp; Schemes<\/h2>\n                  <p>Standards such as ISO\/IEC 27001, along with other frameworks and management system standards like COBIT, ISO 9001, ITIL, and ISO\/IEC 20000, can be highly beneficial for organizations in developing effective governance practices and achieving compliance with statutory and regulatory requirements.<\/p>\n               <\/div>\n            <\/div>\n\t     <div class=\"blogHomeList\">\n               <div class=\"row\">\n                 <div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"450\" height=\"450\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/forestry.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/forestry.jpg 450w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/forestry-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/forestry-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Standards &amp; Schemes<\/div>\n                        <div class=\"main-heading\">Sustainable Forestry Initiative (SFI)<\/div>\n                        <div class=\"main-description\">Sustainable Forestry Initiative (SFI) The Sustainable Forestry Initiative (SFI) Program consists of three main components: Forest Management, Fiber Sourcing, and Chain of Custody. Forestry Initiative&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/sustainable-forestry-initiative-sfi\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div><div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"450\" height=\"450\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/customized-second-party-audits-01.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/customized-second-party-audits-01.jpg 450w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/customized-second-party-audits-01-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/customized-second-party-audits-01-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Audit &amp; Certification<\/div>\n                        <div class=\"main-heading\">Customized &amp; Second Party Audits<\/div>\n                        <div class=\"main-description\">Customized &amp; Second Party Audits Customized audits and second-party audits are two types of auditing approaches that organizations can utilize to meet specific requirements and&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/customized-second-party-audits\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div><div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"450\" height=\"450\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Costco-Supplier-Requirements.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Costco-Supplier-Requirements.jpg 450w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Costco-Supplier-Requirements-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Costco-Supplier-Requirements-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Standards &amp; Schemes<\/div>\n                        <div class=\"main-heading\">Costco Supplier Requirements<\/div>\n                        <div class=\"main-description\">Costco Supplier Requirements All facilities that are involved in processing, packing, warehousing, or distributing consumable products or supplying food-contact packaging materials to Costco Wholesale Corporation&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/costco-supplier-requirements\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div><div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"450\" height=\"450\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/medical-devices.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/medical-devices.jpg 450w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/medical-devices-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/medical-devices-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Audit &amp; Certification<\/div>\n                        <div class=\"main-heading\">Medical Devices<\/div>\n                        <div class=\"main-description\">Medical Devices Medical devices are instruments, equipment, implants, or software used in the diagnosis, treatment, or prevention of medical conditions he regulatory requirements for the&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/medical-devices\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div><div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"400\" height=\"400\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Complaint-Appeals.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Complaint-Appeals.jpg 400w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Complaint-Appeals-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/Complaint-Appeals-150x150.jpg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Client Services<\/div>\n                        <div class=\"main-heading\">Complaints &amp; Appeals<\/div>\n                        <div class=\"main-description\">Complaints and Appeals QCI Global, a comprehensive process is in place to handle complaints and appeals effectively. We have a well-defined process in place to&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/complaints-appeals\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div><div class=\"col-md-6 col-lg-4 flexCol\">\n            <div class=\"card latestBlogBlock border-0\">\n               <div href=\"#\" title=\"\" class=\"latestBlogBlockItem\">\n                  <div class=\"latestBlogImageThumb\"><img width=\"450\" height=\"450\" src=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/why-certify.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/why-certify.jpg 450w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/why-certify-300x300.jpg 300w, http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/why-certify-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/div>\n                  <div class=\"card-body p-0\">\n                     <div class=\"latestBlogContent\">\n                        <div class=\"category\">Audit &amp; Certification<\/div>\n                        <div class=\"main-heading\">Why Certify<\/div>\n                        <div class=\"main-description\">Why Certify Certification provides a range of benefits that contribute to the success and growth of organizations. Drive Continuous Improvement Encourage employees at all levels&hellip;\n                        <\/div><div class=\"post-date-wrapper flexCol\">\n                  <a href=\"http:\/\/148.76.139.49\/qci-global\/why-certify\/\" title=\"View Courses\" target=\"\" class=\"\" rel=\"noopener\">Read More \u00bb<\/a>\n               <\/div>\n                     <\/div>\n                  <\/div>\n               <\/div>\n            <\/div>\n         <\/div>\n               <\/div>\n            <\/div>\n         <\/div>\n      <\/section>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Information and cybersecurity, refers to the practices and measures taken to protect digital information from unauthorized access, use, disclosure, disruption, modification, or destruction.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1265,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"main-template.php","meta":[],"categories":[17,18],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security - QCI Global<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/148.76.139.49\/qci-global\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - QCI Global\" \/>\n<meta property=\"og:description\" content=\"Information Security Information and cybersecurity, refers to the practices and measures taken to protect digital information from unauthorized access, use, disclosure, disruption, modification, or destruction.&hellip;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/148.76.139.49\/qci-global\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"QCI Global\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-23T17:13:42+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/information-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/148.76.139.49\/qci-global\/information-security\/\",\"url\":\"http:\/\/148.76.139.49\/qci-global\/information-security\/\",\"name\":\"Information Security - QCI Global\",\"isPartOf\":{\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#website\"},\"datePublished\":\"2023-05-29T15:32:56+00:00\",\"dateModified\":\"2023-06-23T17:13:42+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/148.76.139.49\/qci-global\/information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/148.76.139.49\/qci-global\/information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/148.76.139.49\/qci-global\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/148.76.139.49\/qci-global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#website\",\"url\":\"http:\/\/148.76.139.49\/qci-global\/\",\"name\":\"QCI Global\",\"description\":\"| Audit &amp; Certification | QCI Global USA\",\"publisher\":{\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/148.76.139.49\/qci-global\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#organization\",\"name\":\"QCI Global\",\"url\":\"http:\/\/148.76.139.49\/qci-global\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/logo.png\",\"contentUrl\":\"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/logo.png\",\"width\":200,\"height\":156,\"caption\":\"QCI Global\"},\"image\":{\"@id\":\"http:\/\/148.76.139.49\/qci-global\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security - QCI Global","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/148.76.139.49\/qci-global\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security - QCI Global","og_description":"Information Security Information and cybersecurity, refers to the practices and measures taken to protect digital information from unauthorized access, use, disclosure, disruption, modification, or destruction.&hellip;","og_url":"http:\/\/148.76.139.49\/qci-global\/information-security\/","og_site_name":"QCI Global","article_modified_time":"2023-06-23T17:13:42+00:00","og_image":[{"width":450,"height":450,"url":"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/06\/information-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/148.76.139.49\/qci-global\/information-security\/","url":"http:\/\/148.76.139.49\/qci-global\/information-security\/","name":"Information Security - QCI Global","isPartOf":{"@id":"http:\/\/148.76.139.49\/qci-global\/#website"},"datePublished":"2023-05-29T15:32:56+00:00","dateModified":"2023-06-23T17:13:42+00:00","breadcrumb":{"@id":"http:\/\/148.76.139.49\/qci-global\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/148.76.139.49\/qci-global\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/148.76.139.49\/qci-global\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/148.76.139.49\/qci-global\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"http:\/\/148.76.139.49\/qci-global\/#website","url":"http:\/\/148.76.139.49\/qci-global\/","name":"QCI Global","description":"| Audit &amp; Certification | QCI Global USA","publisher":{"@id":"http:\/\/148.76.139.49\/qci-global\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/148.76.139.49\/qci-global\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/148.76.139.49\/qci-global\/#organization","name":"QCI Global","url":"http:\/\/148.76.139.49\/qci-global\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/148.76.139.49\/qci-global\/#\/schema\/logo\/image\/","url":"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/logo.png","contentUrl":"http:\/\/148.76.139.49\/qci-global\/wp-content\/uploads\/2023\/07\/logo.png","width":200,"height":156,"caption":"QCI Global"},"image":{"@id":"http:\/\/148.76.139.49\/qci-global\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/pages\/530"}],"collection":[{"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/comments?post=530"}],"version-history":[{"count":9,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/pages\/530\/revisions"}],"predecessor-version":[{"id":1266,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/pages\/530\/revisions\/1266"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/media\/1265"}],"wp:attachment":[{"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/media?parent=530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/categories?post=530"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/148.76.139.49\/qci-global\/wp-json\/wp\/v2\/tags?post=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}