Category: Controls

Vendor Risk Management

In today’s business hustle, teaming up with external vendors is common. Picture this: you’re a company working…

Monitoring activities

In a world driven by digital interactions and data flows, information security stands as a paramount concern….

Data Logging

In our interconnected world, where the flow of information never seems to cease, safeguarding sensitive data has…

Information backup

In our increasingly digital world, the importance of information backup cannot be overstated. Whether you’re a tech-savvy…

Information deletion

In today’s interconnected digital age, information has become an invaluable asset. From personal records to business transactions,…

Configuration management

Management of configuration refers to the process of identifying, organizing, documenting, and controlling the components and settings…

Management of technical vulnerabilities

Management of technical vulnerabilities is a process used to identify, assess, and control the potential security risks…

Protection against malware

Malware, or malicious software, is an increasingly prevalent threat to organizations of all sizes. It is a…

Secure authentication

Authentication is all about validating the identity of an entity like a user or system. The authentication…

Classification of information

To ensure the correct level of protection is set for a certain information asset, the information needs…

Access to source code

In the resent years, attacks on source code has been increasing. Examples are Microsoft, Lastpass and Samsung….

Data masking

When talking about data masking, most people think about encryption, or pseudonymization. These are just two of…

Physical security perimeters

Phisical perimeters are the surroundings of your office buildings, data centers or any other location your employees…

Information access restriction

Access restrictions prevent unauthorized reading, adjusting, copying, using or deleting of information and information processing systems or…

Data leakage prevention

Nowadays a lot of people work from their home instead of the office. And almost everyone has…

Capacity management

According to Wikipedia, capacity management ensures “that information technology resources are sufficient to meet upcoming business requirements…

Privileged access rights

Privileged access rights, sometimes called elevated rights or high level access rights, are used to access important…

User endpoint devices

Endpoint devices are all devices users use to view digital information, like a personal computer, laptop, smartphone…

Segregation of networks

When managing large networks, it can help to devide them into segments. Each segment can have it’s…

Clock synchronization

When you need to analyse logs, it will help you when all the time settings are equal….