by Gerdien van den Bosch | May 30, 2018 | Information security, Security tips
Regardless of the size of your business or the industry you are in, an information security program is a critical document for any organization. A good information security program consists of a comprehensive set of information security policies and procedures. Having...
by Gerdien van den Bosch | May 13, 2018 | Cybersecurity, Information security, Security tips
Many security investments are driven by regulatory and industry standards compliance requirements, but that often leads to a reactive security approach, leaving gaps that can be easily exploited. We believe an end-to-end stance is required that covers processes from...
by Gerdien van den Bosch | May 8, 2018 | Information security, Security tips
To gain information on network activities, log management and log reviewing should be part of the daily operational procedure, but it is often overlooked as a vital step in information security. Looking through logs all day is not favourable and even with a...
by Gerdien van den Bosch | Mar 20, 2018 | Compliance, Information security
In the security community, compliance is often treated with disregard. The statement is often made that compliance is the enemy of security. Compliance is only about ‘ticking the boxes’, and not ticking enough boxes did not cause Equifax to get breached. I...
by Gerdien van den Bosch | Jan 18, 2018 | Information security, Security tips
In today’s work, culture companies are adopting ‘bring your own device’ (BYOD) technology and policies, allowing for more flexible work practices, greater productivity, and savings on IT hardware. However, BYOD can also pose a major cybersecurity threat. All it takes...
by Gerdien van den Bosch | Dec 21, 2017 | GDPR, Information security
With the General Data Protection Regulation (GDPR) deadline less than 6 months away, encryption is a key technology that will enable organizations to comply with the regulations and avoid heavy financial penalties. With the increasing number of data breaches, an...