From Trainee to Security Consultant Wendy's focus on information security grew during her HBO-ICT studies, which is why she chose the Security Consultant traineeship. Since then, she has...
Data at risk from use of AI chatbots It is happening more and more; employees using AI chatbots to quickly draft an email or write a summary....
Hacked, now what? You can no longer send emails, important data is no longer accessible, and backups are encrypted. You have been hacked,...
How do you make sure your business keeps running? Your biggest fear is that your organization's IT systems are failing. The survival of your business, of course, is...
Cybersecurity and Drivers: how the NIS2 increases your accountability The NIS2 is coming! This means that not only your organization, but also you as a director must meet strict requirements...
Access to patient records and the NIS2 - Logspect Does your organization work with patient records? Then you know the importance of ensuring privacy and security. Many hospitals monitor...
Privacy and information security: what is what? The terms privacy and information security are frequently confused. But how you as an organization should deal with these...
The most important link in information security is your staff For centuries, evil-doers have taken advantage of man's gullibility. Consider the Horse of Troy. A...
Free applications: three risks to watch out for Free applications offer the greatest convenience, such as WhatsApp to communicate and WeTransfer to share files. Fine you...
Better to prevent than to pay: CEO fraud Research by Allianz Trade shows that by 2023, 11% of all external frauds suffered by Dutch companies will...