Category: Controls

banner risk management

Vendor Risk Management

In today’s business hustle, teaming up with external vendors is common. Picture this: you’re a company working…

monitoring activities

Monitoring activities

In a world driven by digital interactions and data flows, information security stands as a paramount concern….

data logging

Data Logging

In our interconnected world, where the flow of information never seems to cease, safeguarding sensitive data has…

information backup

Information backup

In our increasingly digital world, the importance of information backup cannot be overstated. Whether you’re a tech-savvy…

information deletion

Information deletion

In today’s interconnected digital age, information has become an invaluable asset. From personal records to business transactions,…

configuration management

Configuration management

Management of configuration refers to the process of identifying, organizing, documenting, and controlling the components and settings…

technical vulnerabilities

Management of technical vulnerabilities

Management of technical vulnerabilities is a process used to identify, assess, and control the potential security risks…

protection against malware

Protection against malware

Malware, or malicious software, is an increasingly prevalent threat to organizations of all sizes. It is a…

secure authentication

Secure authentication

Authentication is all about validating the identity of an entity like a user or system. The authentication…

classification information

Classification of information

To ensure the correct level of protection is set for a certain information asset, the information needs…

access to source code

Access to source code

In the resent years, attacks on source code has been increasing. Examples are Microsoft, Lastpass and Samsung….

data masking

Data masking

When talking about data masking, most people think about encryption, or pseudonymization. These are just two of…

physical security perimeters

Physical security perimeters

Phisical perimeters are the surroundings of your office buildings, data centers or any other location your employees…

information access restriction

Information access restriction

Access restrictions prevent unauthorized reading, adjusting, copying, using or deleting of information and information processing systems or…

data leakage prevention

Data leakage prevention

Nowadays a lot of people work from their home instead of the office. And almost everyone has…

capacity management

Capacity management

According to Wikipedia, capacity management ensures “that information technology resources are sufficient to meet upcoming business requirements…

privileged access rights

Privileged access rights

Privileged access rights, sometimes called elevated rights or high level access rights, are used to access important…

user endpoint devices

User endpoint devices

Endpoint devices are all devices users use to view digital information, like a personal computer, laptop, smartphone…

segregation of networks

Segregation of networks

When managing large networks, it can help to devide them into segments. Each segment can have it’s…

clock synchronization

Clock synchronization

When you need to analyse logs, it will help you when all the time settings are equal….