The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety. There are a lot of false narrative related to cybersecurity, and unless you are having the required digital skills to evaluate them all, it can be quite challenging […]
Judge people based on what they do, not on what they say they do. Some people claim “you can see who I am by looking at what I do” but as soon as you have a closer look at what they actually do, you will quickly discover that they mean “listen to what I say
What is the annual budget for privacy protection? We all know that nothing happens in corporations and organizations with a budget and a mandate, and in most cases budgets are not available without a mandate to execute. What we see is a growing awareness for the obligations of privacy protection, especially since the introduction of
Using systems beyond End-of-Life is a significant cyber risk. Almost everyone who has been or is in a role with responsibility for IT has been in a situation where devices or operating systems had reached their end-of-life, but there were logical explanations why it would make sense to keep using them. Other priorities, budget restrictions,
A cyber incident will happen. Plan and prepare accordingly! There are two phases in a cyber incident that influence the duration and impact. First there is of course the type of attack and how sophisticated it is. Although we must do everything possible to prevent a cyber incident, it is hardly possible to guarantee that
Great leaders have kindness, gratitude and humility in common. That is why they speak about the accomplishments of their teams. The best way to learn about the values of a leaders is to pay attention to the way they communicate during successes and failures. Great leaders have in common that they appraise their team for
People who say you can do everything you want when you want it enough haven’t dealt with real problems.
People who say you can do everything you want when you want it enough haven’t dealt with real problems. It is easy to say that you can achieve anything you want when you want it enough, but it is also far from realistic. There are many situations where the circumstances are stacked against whatever it
Nothing is particularly hard if you divide it into small jobs. – Henry Ford One major challenge when trying to find solutions is being able to divide the problem at hand into logical and understandable steps. Not only is this essential to increase the chances of solving the problem, according to Henry Ford it even
Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!
Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Our study The Human Element in Cybersecurity shows that abandoned technology is by far the largest root cause of cybersecurity incidents. And a significant part of abandoned technology is unpatched vulnerabilities. Vulnerabilities in applications, firmware, operating systems, drivers,
After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill.
After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill! For many years the focus of cybersecurity initiatives has mainly been on technology, which is of course important but does not cover the entire bandwidth of challenges and