COMPLIANCE & PRIVACY
As a company, it has become increasingly more important to take care of your data, requiring significantly more than just technical IT security. Legislation such as GDPR and the new NIS2 directive, along with historical pressure from IT criminals, resulting in the requirements for internal information security being historically high. Therefore, it is absolutely essential have complete control of you tools and best practice when working with processes, law, technical security and employee behavior.
CYBERSECURITY & CYBERTHREATS
Cybercrime is one the most rapidly evolving forms of crime, and Danish companies of all sizes and sectors are hit by attacks from hackers who want to blackmail them, sabotage them or just to do ravage. Cyber attacks can disrupt operations and cost millions - that's why today you have to know the methods hackers use and what you can do to resist them.
IDENTITY & ACCESS MANAGEMENT
The hacker threat against Danish companies has never been greater, and for many the question is not IF you will be compromised, but when you will be compromised - and what you can do to minimize the damage. Hackers will often find their way into the systems via compromised employees, which makes it more important than ever know which people have access to which systems.
It-security is about more than servers, smartphones and computers. Everything from coffee machines to industrial robots are connected to the internet. As IOT take over the amongst others, the industrial aspect, it vulnerabilities moves from offices to factories and other industrial sectors, whom are not used to think about cybersecurity.
There are both advantages and disadvantages in regards to moving to the cloud, and it's easy to lose track of them. Whether the cloud is more or less secure than other solutions is difficult to answer unequivocally. The big cloud suppliers more resources in the area of security than any Danish company will ever have. On the other hand, you can easily make mistakes about the distribution of responsibilities and whether the cloud supplier's security fits the customer's setup. Cloud can have both financial and technological advantages, but even if you do move data over to a supplier, security does not come naturally.