Browsing Category

Knowledge

How to establish a cybersecurity culture

A large share of cybersecurity incidents in organisations have been attributed to the activities and behaviour of staff members. The culture within an organisation has a strong influence on staff behaviour and the choices they make in their work. Understanding the character of this culture is crucial information to both understand and improve how…

Assessing training needs

With the continuous risk and threat of cybersecurity incidents in healthcare, many organisations have implemented various security measures, awareness campaigns and training. The current focus lies on the role of the human factor in cybersecurity, meaning that awareness and training programs are seen as the leading solutions for many organisations…

Cyber Incident Response and Management

Any organisation that works with digital technologies and deals with (sensitive) personal data should have an incident response strategy in place. Recent reports indicate that healthcare organisations still needs improving in this area, as plans were either informal or non-existent (Snell, 2018). Incident response is a crucial part of managing…

How to detect a hacker

A commonly heard statement on the topic of cybersecurity is “it’s not about if a cyberattack happens, but when it happens”. This is because every organisation that collects, processes, stores and transmits data is a potential target for cybercriminals. Healthcare organisations deal with valuable personal data, so it is not surprising that hackers…

How to handle personnel information

When considering cybersecurity in healthcare, the focus usually lies on the protection of the personal data of patients. However, as is the case for each organisation, healthcare organisations deal with a second category of data subjects, namely their staff. According to information security experts, human resources and administrative departments…

How to handle health data

Health data is all the information that relates to the health status of a person. This concerns not just medical data, such as physical health data and mental health data, but also financial and administrative data related to healthcare provision (Simoncini, 2017). When health data relates to an identified or identifiable individual it is…

Ransomware: risks and preventive actions

Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. WannaCry, SambaCry, CryptoLocker, Petya and Locky are some of the more common names of ransomware that have become part of mainstream news, and even persons working outside of security related fields…

Cybersecurity management guidelines

In the global race for economic competitiveness, the digital readiness of organisations has become a key factor. Therefore, cybersecurity has become an increasingly important safety issue. In addition, cybercrime has shifted from attacking big corporations to also attacking  other industries, like financial services and increasingly organisations…

Habits to be safe online (cyber hygiene)

Cyber hygiene, or habits to be safe online, is related to the practices and steps that computer or device users do to maintain information safety and improve online security. These practices are often part of a routine to ensure the security of identity and other information that could be stolen or harmed. Cyber hygiene in healthcare Medical…

How to create strong passwords

Given the number of websites for which most people have accounts, there is no simple way to easily remember every single password without duplicating passwords or utilizing some sort of pattern. Hackers use a multitude of methods to compromise security and gain access to systems. Hackers learn which passwords are used most through brute force…