With a clear emphasis on measuring process effectiveness and performance QX follows the globally-accepted ISO 9001:2015 quality management system (QMS). In addition to giving us access to industry best practices, the adoption of a BSI-accredited, ISO framework helps us continually monitor and improve our procedures and processes.
To maintain rigorous quality control, we undertake regular training and audits. Our internal auditors verify the efficiency and effectiveness of our procedures and revise them, wherever needed. Moreover, to ensure that business objectives continually feed into our processes we validate our quality management system by third-party auditors.
THE BENEFITS OF A QMS:
Through our compliance with a quality management system, we display our commitment to quality and excellence to our clients.
Following a successful audit by the British Standards Institution (BSI), QX Global Group earned the internationally-recognized ISO 27001:2013 certification for its information security management system. The British Standards Institute’s ISO 27001:2013 is the current best-in-class standard for Information Security Management Systems.
QX FOLLOWS SECURITY GUIDELINES SUCH AS:
QX Global Group recognizes the need for such a certification and acknowledges that ISO 27001:2013 indeed ensures appropriate safety controls to securely protect information and intellectual property. As an ISO 27001:2013 compliant organisation, we treat information as the most valuable asset and continually assesses our systems to ensure the highest level of information security.
QX Global Group is now Cyber Essential certified, which demonstrates that the company has vigorous IT defences that are designed to contest cyber-attacks. The scheme has been designed by the UK Government to help organisations mitigate internet-based risks.
The five basic controls within Cyber Essentials were chosen because, when properly implemented, they will help to protect against unskilled internet-based attackers using commodity capabilities – which are freely available on the internet. The scheme addresses five key controls (below), that when implemented correctly can prevent 80% of cyber-attacks.