U

How Public Sector Businesses can protect sensitive information

How Public Sector Businesses can protect sensitive information

The public sector handles a significant amount of sensitive information related to public services and administration. The challenge is to protect this data from breaches that could lead to identity theft, financial loss or misuse of personal information. It is also...
Things to consider when procuring IT security

Things to consider when procuring IT security

Does your organisation have plans to procure your IT security? Then there are a lot of important things to think about. We give you some recommendations on what you need to do to get a successful procurement.    ...
How CISOs can battle their challenges

How CISOs can battle their challenges

CISOs face many challenges when working with cybersecurity. There are not only laws you must follow, but also best-practices that can help you avoid pitfalls and security risks along the way. And even if you have a clear plan of how you should work with cybersecurity,...
How do you carry out a protective security analysis?

How do you carry out a protective security analysis?

When you start to work with protective security, the first step is to carry out a protective security analysis. Such an analysis is the basis for all protective security work. So, how do you do a protective security analysis? Technological development gives us many...