Skip to content

Categories: cybersecurity

Breach Preparedness

Breach Preparedness

9-1-1 or 1-1-2 is used globally when calling for help. But which number is used for requesting cyber-help?

Hackers can easily exploit known vulnerabilities

Hackers can easily exploit known vulnerabilities

Hackers can easily exploit known vulnerabilities, says Artur Ganc, Principal Consultant in NNIT A/S. Get his 10 steps to successful patch management framework here: http://bit.ly/2evEu2f

Keep your sensitive data secure

Keep your sensitive data secure

Data Access Governance requires careful consideration, be balanced to business needs, and needs to be based on how important it is to keep your sensitive data secure. Happy to announce yet another Security Insight blog post. Today published by Johan Holkmann Jacobsen, Identity & Access Management Senior Consultant in NNIT A7S. Read more here. 

​Yes, we need protection, all of us!

​Yes, we need protection, all of us!

​Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. ​Read the full article here.