Welcome

Are you looking for a way to setup your cyber security for yourself or your company? Or are you just looking for help on how a specific control can help you improve on your already excisting security measures?

At Security Booster i’m here to boost up your security by providing you a helping hand for building your cyber security defense and secure your organisation or home. Every week i will provide you with new detailed information how to safeguard or take countermeasures to avoid, detect or minimize security risks. These security topics, known as security controls, are well known in the most popular security frameworks like the ISO27002, COBIT or NIST SP 800 series.

If you want to know more about me or why i created this website, please check the About page in the top menu.

Logo

Latest additions:

  • Access Policy
    Access control policies are the bedrock of any robust cybersecurity strategy. They define who can access what information and systems within an organization, and under what conditions. Without a well-defined and effectively implemented access control policy, organizations leave themselves vulnerable to a wide range of threats, from data breaches and financial loss to reputational damage and legal repercussions. An access…
  • Vendor Risk Management
    In today’s business hustle, teaming up with external vendors is common. Picture this: you’re a company working with a bunch of vendors for software, services, and maybe even office supplies. It’s all good, but here’s the catch – these collaborations open up a door to potential security risks. Let me paint a picture with a couple of examples. Remember the…
  • Monitoring activities
    In a world driven by digital interactions and data flows, information security stands as a paramount concern. Regardless of your technical background, safeguarding networks, systems, and applications against potential cyber threats is of utmost importance. At the forefront of this security effort lies the practice of continuous monitoring, a vigilant guardian that detects anomalous behavior and responds swiftly to potential…
  • Data Logging
    In our interconnected world, where the flow of information never seems to cease, safeguarding sensitive data has become a matter of utmost importance. Yet, the realm of cybersecurity can often appear as an impenetrable fortress of technical jargon and complex concepts. In this article, we embark on a journey to unravel one such enigma: data logging. Our mission is to…
  • Information backup
    In our increasingly digital world, the importance of information backup cannot be overstated. Whether you’re a tech-savvy professional or someone who simply enjoys browsing the internet, your digital life is filled with valuable data – from cherished family photos to important work documents. What if one day, all of this data vanished or encrypted by ransomware? This is where information…
  • Information deletion
    In today’s interconnected digital age, information has become an invaluable asset. From personal records to business transactions, vast amounts of data are generated and stored every day. However, with the rise of cyber threats and privacy breaches, it has become crucial to recognize the significance of deleting information in accordance with information security standards. Deleting data not only helps protect…

more…