U

Things to consider when procuring IT security

Things to consider when procuring IT security

Does your organisation have plans to procure your IT security? Then there are a lot of important things to think about. We give you some recommendations on what you need to do to get a successful procurement.    ...
How CISOs can battle their challenges

How CISOs can battle their challenges

CISOs face many challenges when working with cybersecurity. There are not only laws you must follow, but also best-practices that can help you avoid pitfalls and security risks along the way. And even if you have a clear plan of how you should work with cybersecurity,...
How do you carry out a protective security analysis?

How do you carry out a protective security analysis?

When you start to work with protective security, the first step is to carry out a protective security analysis. Such an analysis is the basis for all protective security work. So, how do you do a protective security analysis? Technological development gives us many...
How municipalities keep citizens’ integrity and privacy safe

How municipalities keep citizens’ integrity and privacy safe

Ransomware attacks on municipalities and similar organisations are more frequent than ever. The attacks can block all computers, and thus all digital communication, with the attacker demanding a huge ransom to unblock them. Avoiding digital communication is hardly an...