by Gerdien van den Bosch | May 13, 2018 | Cybersecurity, Information security, Security tips
Many security investments are driven by regulatory and industry standards compliance requirements, but that often leads to a reactive security approach, leaving gaps that can be easily exploited. We believe an end-to-end stance is required that covers processes from...
by Gerdien van den Bosch | May 8, 2018 | Information security, Security tips
To gain information on network activities, log management and log reviewing should be part of the daily operational procedure, but it is often overlooked as a vital step in information security. Looking through logs all day is not favourable and even with a...
by Gerdien van den Bosch | Feb 12, 2018 | Cybersecurity, Security tips
Every 40 seconds, a company gets hit by a ransomware attack. Ransomware is malicious software that cybercriminals use to hold your computer or computer files for ransom, demanding payment from you to get them back. It hits the device when navigating through various...
by Gerdien van den Bosch | Jan 18, 2018 | Information security, Security tips
In today’s work, culture companies are adopting ‘bring your own device’ (BYOD) technology and policies, allowing for more flexible work practices, greater productivity, and savings on IT hardware. However, BYOD can also pose a major cybersecurity threat. All it takes...
by Gerdien van den Bosch | Jan 11, 2018 | Compliance, Security tips
Many companies are finding it difficult to recruit the right skilled security staff. Deploying and maintaining an effective IT security system is no easy task and the people with the right knowledge and experience are in short supply. The situation is likely to get...
by Gerdien van den Bosch | Nov 28, 2017 | Information security, Security tips
The role of the CISO (Chief Information Security Officer) is relatively new. While it is becoming increasingly accepted as a central role in managing the data and security measure, the profession continues to evolve. This is because information security isn’t just a...