With this certification Telenor Linx demonstrates commitment to identifying and managing information security risks effectively, consistently, and measurably at every level of the organization, including all physical locations the company operates in.
“Being compliant with the ISO 27001 standard and working with security in a systematic manner is at the core of our business and our culture in Telenor. Trust is increasingly important in today’s complex world and thus an important business differentiator. Being a trusted partner is essential for new opportunities to open up and with this certification we have proven that we provide the highest level of information security management for our customers and partners.”, says Stig Waagbø, CEO of Telenor Linx.
“Achieving this certification is the result of tremendous teamwork from all employees in the company. We are proud to demonstrate that security is an integral part of our day-to-day business and have shown that this is the case for all our services. ISO 27001 provides a structured framework for managing information security risks and has helped us establish and improve well-defined security controls and policies for areas like access control, encryption and employee training. Technology and tools are imperative in managing security, but the awareness and the security mindset of the employees in Telenor Linx is what allows me to sleep well at night”, says Peter Heggløv, Head of Security and Business Security Officer at Telenor Linx.
Implementing and maintaining the security controls in ISO 27001 helps elevate a company’s security maturity. In a challenging and rapidly evolving threat landscape, streamlining operations and reducing risks is a never-ending battle. ISO 27001 helps Telenor Linx to continuously work to fortify our defences and safeguard our customers future. Implementing an established and robust information security management system (ISMS) ensures that we speak the same security language, have a common risk methodology and improves our ability to identify and address vulnerabilities and reduce the likelihood of security incidents and data breaches.