Browsing Category

Risk Assessment & Checklists

Threat Modeling for Data Protection

When evaluating the security of an application and data model ask the questions: What is the sensitivity of the data? What are the regulatory, compliance, or privacy requirements for the…

How to establish a cybersecurity culture

A large share of cybersecurity incidents in organisations have been attributed to the activities and behaviour of staff members. The culture within an organisation has a strong influence on staff…

Assessing training needs

With the continuous risk and threat of cybersecurity incidents in healthcare, many organisations have implemented various security measures, awareness campaigns and training. The current focus lies on…

Cyber Incident Response and Management

Any organisation that works with digital technologies and deals with (sensitive) personal data should have an incident response strategy in place. Recent reports indicate that healthcare organisations…

How to detect a hacker

A commonly heard statement on the topic of cybersecurity is “it’s not about if a cyberattack happens, but when it happens”. This is because every organisation that collects, processes, stores and…

How to handle personnel information

When considering cybersecurity in healthcare, the focus usually lies on the protection of the personal data of patients. However, as is the case for each organisation, healthcare organisations deal…

How to handle health data

Health data is all the information that relates to the health status of a person. This concerns not just medical data, such as physical health data and mental health data, but also financial and…