- Customer Case
- Solution descriptions
- Use Case
- White paper
Guide: Stay secure during the summer
Not sure if you’re secure for summer? Read our tips! Summer is a time for sun, swimming and relaxation. But not everyone rests in the summer – holiday season is a time when many attackers strike as many businesses wind down. Among other things, it could be that fewer employees are on site to keep …
Secure management’s commitment to cybersecurity
Digitalisation is making information security an area that is becoming increasingly important. With more and more devices connected to the Internet, the possible attack surfaces into your own IT infrastructure are increasing and all companies and authorities need to ensure that they are doing what they can to avoid an attack. A structured approach to …
How to start working with digital responsibility
There’s a growing concern about how to establish secure information exchanges. Companies must think about how they take their digital responsibilities. This responsibility means working with information management in a proactive and sustainable way. We believe that secure information flows are necessary for you to be respected as an attractive employer and leading-edge business. Responsible …
5 steps for secure IT/OT integration
The need to connect OT with the outside world has increased along with the digitalisation of society. But the different needs in IT and OT can easily lead to technical conflicts that can be challenging to deal with. We have listed 5 steps for how you can securely integrate IT/OT! The method is based upon …
10 measures for Scada security
The basis for all work with information security, for all companies, is a continuous and systematic approach. If implemented correctly, it identifies several different security functions. But which measures are the most important for achieving security in SCADA systems? In this guide, we compile the various security measures with which you commonly need to work!
CISO your guide to cybersecurity
Downoad our free guide – read our advice on how to handle the challenges of cybersecurity! A CISO faces many challenges when working with cybersecurity. In this guide, we present three articles that teach you about laws you should be aware of, security risks you should avoid, and how to convince management to prioritise cybersecurity. …
How do you do a protective security analysis
When starting to work with protective security, the first step is to carry out a protective security analysis. Such an analysis is the basis for all protective security work. You are obliged to make a protective security analysis if you conduct security-sensitive activities to investigate the need for protective security. But how do you do …
The NIS 2 Directive
On the 10th of November 2022, the proposal for NIS 2 nwas adopted and the directive has now been published. NIS 2 means that there will be a risk of large fines if you do not meet the requirements. So how do you make sure that your organisation will not be hit by the sanctions? …
5 steps for network segmentation
An important part of improving your cybersecurity is to work with network segmentation. Network segmentation in data networks means dividing a data network into subnetworks, where each is a network segment. The benefits of such splitting are mainly to improve security and performance. We have defined 5 steps for network segmentation, and hope that these …
Are you sure that you are secure?
Lack of cybersecurity is a major risk to businesses today. We read about companies that have been attacked all the time, with a great cost to both the business and the customers. All organisations have sensitive data that is vulnerable to cyberattacks. That is why it is critical for everyone to employ steps to improve …
8 pieces of advice when starting information security work
The digital world places new and higher demands on information security as a connected community may offer many advantages and opportunities, but also opens new ways for attackers to get into our computers and/or systems. New laws have been passed to increase preparedness. These require that organisations delivering services essential to society increase their information …
Why choose an Advenica data diode?
A data diode is a cybersecurity solution that ensures unidirectional information exchange. This high assurance hardware device maintains both network integrity by preventing intrusion, as well as network confidentiality by protecting the most security sensitive information. In this guide, we give you 14 reasons why you should choose a data diode from Advenica!