ISO 27001 standard: implementation at TheCodingMachine!

If you don’t know what ISO 27001 standard is, here’s an article that succinctly describes what it is, why we’re doing it and where we are. It’s an ongoing project, not yet a feedback report. If you’d like to discuss the subject with me, please don’t hesitate to get in touch!

Image illustrating cybersecurity for ISO 27001 standard

First, what are the key points of ISO 27001 standard?

ISO 27001 is an international standard for information security management. It is designed to implement, maintain, monitor and improve an information security management system (ISMS) within an organization. The main objective of ISO 27001 is to guarantee the confidentiality, integrity and availability of sensitive and critical information. A few key points:

  • It aims to help organizations establish a framework for identifying, assessing and managing information security risks: data loss, cybercrime, security breaches, service interruptions and other information-related threats.
  • Implementing an ISMS involves identifying critical information assets, assessing risks, implementing appropriate security controls, training employees and continuously monitoring ISMS performance.
  • Organizations must be audited by independent third parties to verify compliance with ISO 27001 standard.

Finally, this standard encourages continuous improvement in information security management. Organizations are encouraged to regularly monitor and review their ISMS to ensure that it remains effective in the face of changing threats.

Why implement this approach?

Admittedly, we started this process somewhat under duress. One of our major customers required it of its partners. On closer examination, we realized that it could be interesting for several reasons:

  • Better protect sensitive information such as customer data, financial data or trade secrets.
  • Reduce security threats and incidents such as data breaches, service interruptions and cyber-attacks.
  • Comply with legal and regulatory information security requirements.
  • Strengthen trust with our customers and business partners.
  • Better manage business continuity, be prepared for service interruptions, disasters and emergencies.

We also hope this approach will enable us to :

  • Improve operational efficiency by streamlining information security processes and operations.
  • And potentially save money (security incidents can entail significant costs).

What we’ve done and what’s left to do!

The first thing we did was to set up a project team comprising employees from different departments with knowledge of our various processes: IS, HR, Management, Sales, Projects, Technical Management. This team, accompanied by an external auditor from France Certification, enabled us to carry out an initial assessment of the situation: identifying information assets (data, systems, equipment, documents and processes), the threats we might encounter, vulnerabilities and associated risks.

Next, we defined the objectives of our ISMS, identifying the processes, services, locations and information assets to be included within its scope. We also drew up: our IT charter, our secure development policy, our transfer policy and so on. We also set out the organization’s security commitments.

Finally, we have put in place the first elements of our ISMS:

  • Managing information assets such as data, systems, equipment and documents. For example, we realized at this stage that our leases were not being managed very well (we still had leases on computers we no longer had!).
  • Information security risk analysis: identifying and assessing the risks associated with information assets. This is undoubtedly the most time-consuming phase, as you have to go through all the risks and vulnerabilities associated with your organization.
  • Based on the risks we had identified, we drew up and implemented a treatment plan and security controls using Annex A of the ISO 27001 standard. These include technical, organizational and physical controls.
  • The risk treatment plan, which defines how risks are assessed, managed and monitored over time.
  • The organizational structure, including roles and responsibilities for information security, has been clearly defined.
  • Procedures for managing security incidents, with everything recorded, documented and stored.

In addition, several meetings were held with all employees to raise awareness of information security, and to understand the risks and security practices involved. To make the subject a bit fun, we even ran several quizzes and random tests to ensure that the message was well understood and sufficiently integrated.

Les prochaines étapes sont d’effectuer un audit interne pour évaluer la conformité aux exigences de la norme ISO 27001 et pour identifier les éventuels écarts et l’audit de certification qui sera mené par un organisme de certification accrédité.

To conclude

ISO 27001 standard certification takes time and commitment, but we believe it’s essential to strengthen information security and meet security requirements.

Next episode: external audit date September! We’ll keep you posted…

An article by Nicolas Peguin

Generative Artificial Intelligence: what applications for the enterprise?

Like all new technologies, there’s a lot of talk about generative artificial intelligence. In this article, we’ll try to answer the following question: How can we make the most of generative artificial intelligence in a business context?

A quick reminder of what generative artificial intelligence is… for those who haven’t been following along!

Generative artificial intelligence (generative AI) aims to develop applications capable of generating content autonomously, by imitating or simulating human creative processes. These systems use machine learning models, in particular neural networks, to produce new and original data in the form of text, images, music, video or other media.

Illustration of an image generated by Generative Artificial Intelligence

What applications can companies imagine?

On the market, we can distinguish two types of company: those whose core business is to offer generative AI (ChatGPT, for example) and, above all, those who use it to improve their offering and competitive positioning without altering their business model.

We’re particularly interested in the second type of company. Here are a few ideas for using generative AI in this context:

  • Document generation: if you produce documents for your customers such as reports and analyses, AI can bring you real productivity gains.
  • Customer service management: chatbots based on generative AI can offer 24/7 support, answering customer questions, providing product information and helping to solve common problems.
  • Personalizing the user experience: generative AI can analyze customer data and create personalized recommendations for products, for example.

Otherwise, AI can be massively used internally for many purposes:

  • for operations optimization: supply chain planning, inventory management, scheduling and demand forecasting.
  • development generation, by automatically generating parts of source code.
  • training content creation
  • or predictive analysis and forecasting: generative AI can analyze historical data and create forecasts to help companies make informed planning and strategic decisions.

What are we doing today?

Obviously, we’re developing projects involving artificial intelligence. For example, we recently developed a business application in which the user uploads documents so that they are automatically checked and analyzed, with the aim of extracting information to avoid re-entering them. In an account statement, for example, the application verifies that the account holder corresponds to the user, and then automatically retrieves the account number.

Another example of a project carried out for a customer in Hong Kong, the development of an application to generate a technical audit for buildings automatically from data and comments entered by the user.

But it’s internally that artificial intelligence is even more interesting. We’re already getting a lot out of it:

  • Create content ideas and write that content much more quickly (would you be able to guess which sentences in this article were generated by AI?). Of course, the generated content won’t be perfect, so it needs to be re-read and adjusted, but it provides a starting point that is generally of good quality.
  • Assisting our teams during the design phase of our customers’ business applications, for example by generating workshop reports, analyzing product data models, and so on.
  • When it comes to development, new recruits no longer use Stackoverflow to look for solutions to their technical problems. Instead, they use ChatGPT! It may not sound like much, but it’s a fundamental change in the way information is sought.

And, hopefully, unit tests and even functional tests will soon be generated (because that will change our lives).

Conclusion

We’re still a long way from being able to generate an application, even if enormous progress has been made. NoCode, about which we wrote an article last year, coupled with generative artificial intelligence, could make tomorrow’s web… to be continued!

5 practical examples of NFT, Blockchain, and Crypto projects!

NFT, Blockchain, Crypto-currencies are often buzzwords that can be found in all conversations or tech articles these days. But what is behind these words? In this article, we propose to explain (quickly) these concepts and share some practical achievements that these technologies allow.

In addition, many suppliers have emerged and greatly simplify the implementation of projects that exploit these technologies.

In recent months, TCM teams have been called on many projects involving these technologies … especially in Hong Kong where the market is very active.

We are therefore going to present to you the projects carried out or in progress in order to illustrate the ideas, the business models, and the technological challenges.

NFT, Blockchain and crypto-currencies … Some explanations

Schematically, the blockchain makes it possible to secure and certify transactions using cryptography. This security makes it possible to do something that was until now impossible: to certify the uniqueness, the veracity, and the origin of an entirely digital asset whether it is a cryptocurrency or an NFT (in other words, a digital asset).

The blockchain, reputed to be tamper-proof, has provided the confidence that it lacks to have the notion of ownership around a 100% digital asset. This ownership results in the issuance of a single token, a cryptocurrency, or an NFT (Non-Fungible Token), whose ownership legitimacy rests on the blockchain. & Nbsp;

In short, the bottom line is that an NFT, a kind of “digital certificate of ownership”, cannot exist without a blockchain to certify it. Fortunately, today many blockchain technologies, like Hyperledger Fabric or Ethereum, & nbsp; have become freely accessible and usable for many projects, which explains the rise of potential applications and the buzz around the sector. There is no longer any need to develop your own blockchain.

Note: Obviously, we can’t tell you everything, but we will try to show you through project examples the extent of the tidal wave that these technologies represent!

Some application examples: explore the wide range of NFT and Blockchain projects!

1 – Energy auction platform

TCM has developed an energy auction platform that allows suppliers to bid and receive associated contracts in the event of success.

In order to improve the transparency of the auctions, we have enabled the client to set up a private blockchain to host the auction and digitize its procurement process.

Challenges:

  • Integration of Hyperledger Fabric & nbsp;
  • Design of smart contracts

2 – Online prediction platform

TCM is developing a decentralized peer-to-peer prediction platform that allows the community to submit new events and place predictions on any outcome of future events. Users can place their predictions by directly connecting their cryptocurrency wallets. The earnings are immediately received without any delay.

The advantages lie in the security of the transaction and the speed of collecting the winnings.

Challenges:

  • Build an MVP to quickly upload and collect community feedback.
  • Implementation of a smart contract
  • Connection to the cryptocurrency wallet

3 – Crypto wallet

The first cryptocurrency wallet is available to KaiOS users, primarily located in emerging markets. KaiOS is the third most popular operating system after Android and iOS and is supported by popular Nokia phones.

Downloadable from the app store, any KaiOS user has access to their cryptocurrency wallet. While in emerging markets – opening a bank account is not accessible to everyone, this decentralized wallet allows users to store value and easily transact between portfolios. In addition, emerging countries also rely on remittances.

Relatives working abroad tend to send money to their families back home. However, there are administrative fees for sending money services, in addition to long processing times.

This crypto wallet aims to reduce transaction fees while increasing transaction speed. In addition, emerging market currencies tend to be more affected by hyperinflation which – in turn – has a negative impact on people’s purchasing power. Countries like El Salvador have therefore decided to adopt cryptocurrencies as their national currency.

Challenges:

  • Build an MVP in a month
  • Technical study of available third-party solutions
  • Connection to ERC-20 and Bitcoin blockchain networks

4 – NFT live auction marketplace

A virtual marketplace that allows artists to transform their works into NFT and sell them at online auctions, without the need to trust the parties or a centralized authority. During the drawing competition, teams work together to draw their own artwork.

At the end of the session, the creations are on display, allowing people to vote for their favorite works. They are then transformed into NFT by being uploaded to the dedicated marketplace so that the auctions can take place.

Using NFT and the underlying blockchain technology, property rights are transferred in seconds and registered on the peer-to-peer blockchain.

Challenges:

  • Design a seamless user experience, from collection download to asset management.
  • Technical study of available third-party solutions
  • Connection to the Polygon chain

5 – Tokenized real estate investment platform

A real estate investment platform where buyers can buy a fraction of the property and receive pro-rated rents. For sellers, this gives them access to more cash as the investment tickets are significantly lowered.

The blockchain accelerates transaction speed through the use of tokens while ensuring the registration of legal documents.

So, if you are thinking about a project on these technologies, feel free to contact us!

A student Management platform to impact 10,000 migrant workers’ lives!

TheCodingMachine and Uplifters announce the successful launch of a powerful student management platform to increase the social impact on underprivileged people across South East Asia.

“A demonstration of how leveraging technology can also positively impact lives!” TheCodingMachine

TheCodingMachine enables Non-Profit Uplifters to scale its online education solutions for migrant domestic workers.

In this article, we invite you to explore how non-profits can scale their social impact by digitizing and automating their processes.

Uplifters is on a mission.

Uplifters are on a mission to enable migrant domestic workers to transform their lives by unleashing the combined power of online education and community support – thereby making their migration successful.

Uplifters’ core services combine technology with human warmth to enable personal growth. Since their establishment in 2018, more than 5,000 domestic workers have enrolled in their signature programme, Prepare for the Future, a six-month free money management course, mental well-being, and personal development online programme.

Led by Marie Kretz Di Meglio, the community-based organization aims to grow its number of beneficiaries from 800 new beneficiaries in 2019, 2,500 expected in 2021 to 4,000 in 2022.

Achieving higher efficiency with technology and scale social impact.

To support this ambition, TheCodingMachine has enabled Uplifters to achieve higher efficiency with technology and therefore scale its social impact among underprivileged communities.

Involved at an early stage in its project planning, both teams of TheCodingMachine in France and Hong Kong, have helped design and architect an intuitive, modular yet cost-efficient solution.

This September’s launch of Uplifters’ student management platform aims at giving more underprivileged domestic workers access to an online educational platform through social media platforms that they are already familiar with and use on a daily basis: Facebook and Whatsapp.

A critical project to keep on growing

The launch of this student management platform is a key milestone for Uplifters.

“We had reached a bottleneck in terms of the number of beneficiaries we could serve” Marie Kretz Di Meglio, Uplifters Founder & CEO

Uplifters’ staff had to manually enrol and follow up on more than 500 new enrollees per month, which was not scalable.

“We are so excited to now be able to grow our impact!”

Their model combining online courses with peer coaching is innovative and has already been successfully tested over the last three years.

“We have a 100% student satisfaction ratio and 90% say our online programme ‘Prepare for the Future’ (money management, mental well-being and personal development courses) transformed their lives!”

A trusted partner

TCM has been an amazing partner, listening carefully to design a platform meeting our needs whilst being as cost-effective as possible.

Most organisations find it tricky to develop IT projects, but TCM has made this an easy process. It was so rewarding to work with them and finally get to see live the platform we had dreamt of for months.

They were responsive and we did not encounter any delays or unexpected costs once the project had been approved.”

About Uplifters

Uplifters is a Non-profit organization empowering migrant domestic workers and underprivileged communities to break the cycle of poverty and build the lives they want for themselves, their families and their countries.

Website: https://uplifters-edu.org/