{"id":1409,"date":"2021-12-30T01:54:51","date_gmt":"2021-12-30T01:54:51","guid":{"rendered":"http:\/\/web.netbit.gr\/?page_id=1409"},"modified":"2022-02-06T19:04:32","modified_gmt":"2022-02-06T18:04:32","slug":"information-security-management","status":"publish","type":"page","link":"http:\/\/netbit.gr\/index.php\/information-security-management\/","title":{"rendered":"Information Security management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1409\" class=\"elementor elementor-1409\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eb0f1b7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"eb0f1b7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5ac039\" data-id=\"e5ac039\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2845380 elementor-widget elementor-widget-heading\" data-id=\"2845380\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.5 - 27-04-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Information Security management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37c1924 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37c1924\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a839424\" data-id=\"a839424\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be3c964 elementor-widget elementor-widget-spacer\" data-id=\"be3c964\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.5 - 27-04-2022 *\/\n.e-container.e-container--row .elementor-spacer-inner{width:var(--spacer-size)}.e-container.e-container--column .elementor-spacer-inner,.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b5e12e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b5e12e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac46d9d\" data-id=\"ac46d9d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6e8311 elementor-widget elementor-widget-heading\" data-id=\"b6e8311\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IS Management<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a71ebd elementor-widget elementor-widget-text-editor\" data-id=\"4a71ebd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.5 - 27-04-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h4>Information Security Management System<\/h4><p>Net.InfoSec is Net.Bit\u2019s solution for implementing Information Security Management System and business processes in the companies and institutions in order to reduce business operational risk. Operational risks involve potential losses incurred as a result of insufficiency in information security and business processes.\u00a0<\/p><p>Information security today, and wider, operational risk management, represents imperative and has direct impact on the business operational profitability.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2307ff7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2307ff7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be01f03\" data-id=\"be01f03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-93e6a41 elementor-widget elementor-widget-spacer\" data-id=\"93e6a41\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security management IS Management Information Security Management System Net.InfoSec is Net.Bit\u2019s solution for implementing Information Security Management System and business processes in the companies and institutions in order to reduce business operational risk. Operational risks involve potential losses incurred as a result of insufficiency in information security and business processes.\u00a0 Information security today, and &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/netbit.gr\/index.php\/information-security-management\/\"> <span class=\"screen-reader-text\">Information Security management<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security management - NetBit<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/netbit.gr\/index.php\/information-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security management - NetBit\" \/>\n<meta property=\"og:description\" content=\"Information Security management IS Management Information Security Management System Net.InfoSec is Net.Bit\u2019s solution for implementing Information Security Management System and business processes in the companies and institutions in order to reduce business operational risk. Operational risks involve potential losses incurred as a result of insufficiency in information security and business processes.\u00a0 Information security today, and &hellip; Information Security management Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/netbit.gr\/index.php\/information-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"NetBit\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-06T18:04:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"http:\/\/netbit.gr\/#website\",\"url\":\"http:\/\/netbit.gr\/\",\"name\":\"NetBit\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/netbit.gr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/netbit.gr\/index.php\/information-security-management\/#webpage\",\"url\":\"http:\/\/netbit.gr\/index.php\/information-security-management\/\",\"name\":\"Information Security management - NetBit\",\"isPartOf\":{\"@id\":\"http:\/\/netbit.gr\/#website\"},\"datePublished\":\"2021-12-30T01:54:51+00:00\",\"dateModified\":\"2022-02-06T18:04:32+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/netbit.gr\/index.php\/information-security-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/netbit.gr\/index.php\/information-security-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/netbit.gr\/index.php\/information-security-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/netbit.gr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security management\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security management - NetBit","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/netbit.gr\/index.php\/information-security-management\/","og_locale":"en_US","og_type":"article","og_title":"Information Security management - NetBit","og_description":"Information Security management IS Management Information Security Management System Net.InfoSec is Net.Bit\u2019s solution for implementing Information Security Management System and business processes in the companies and institutions in order to reduce business operational risk. Operational risks involve potential losses incurred as a result of insufficiency in information security and business processes.\u00a0 Information security today, and &hellip; Information Security management Read More &raquo;","og_url":"http:\/\/netbit.gr\/index.php\/information-security-management\/","og_site_name":"NetBit","article_modified_time":"2022-02-06T18:04:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"http:\/\/netbit.gr\/#website","url":"http:\/\/netbit.gr\/","name":"NetBit","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/netbit.gr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/netbit.gr\/index.php\/information-security-management\/#webpage","url":"http:\/\/netbit.gr\/index.php\/information-security-management\/","name":"Information Security management - NetBit","isPartOf":{"@id":"http:\/\/netbit.gr\/#website"},"datePublished":"2021-12-30T01:54:51+00:00","dateModified":"2022-02-06T18:04:32+00:00","breadcrumb":{"@id":"http:\/\/netbit.gr\/index.php\/information-security-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/netbit.gr\/index.php\/information-security-management\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/netbit.gr\/index.php\/information-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/netbit.gr\/"},{"@type":"ListItem","position":2,"name":"Information Security management"}]}]}},"_links":{"self":[{"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/pages\/1409"}],"collection":[{"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":13,"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/pages\/1409\/revisions"}],"predecessor-version":[{"id":2851,"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/pages\/1409\/revisions\/2851"}],"wp:attachment":[{"href":"http:\/\/netbit.gr\/index.php\/wp-json\/wp\/v2\/media?parent=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}