Blogs

Let’s get inspired by our blog!

Breens Network and QS solutions join forces

AMSTERDAM, MARCH 28 2024 – Breens Network and QS solutions have entered into a partnership to become the IT partner for organizations looking to accelerate and optimize their digital transformation using Microsoft technologies. The collaboration strengthens their position as IT and security partner in the Netherlands and abroad. The combination is able to better support customers in solutions and services around the security of Microsoft 365, Azure, and data. Together, Breens Network and QS solutions form a strong Microsoft partner.

What’s the recommended frequency for a cyber security assessment?

We regularly publish blogs and articles about carrying out security assessments. About how important that is in order to gain insight into the status of the organization’s cyber security, and to proactively address its security policy. In addition, we keep insisting that conducting an assessment is not a one-off, but must be repeated periodically in order to keep a close watch, and to always stay one step ahead of cybercriminals.

How do you prevent desire paths from endangering your governance?

Employees frequently use alternative methods, often referred to as “desire paths,” to expedite prescribed work processes. While these methods can enhance efficiency, they also introduce cybersecurity risks. These methods often remain invisible to IT administrators and are thus not adequately secured. Yet, alternative methods can also present opportunities. This blog uncovers how your organization can incorporate these practices into your governance plan, consequently establishing a safer and more efficient way of working.

Ella Gud – global partner manager, world traveler and artist

In this series we introduce our team to you one by one. What is their role within QS solutions? Who are they as a person? Why are they a match with the organization? And what do they actually do in their spare time? This will give you, as a customer, business partner or new colleague, an idea of ​​the people behind our logo!

The 10 advantages of a cyber security scan

Cybercrime has experienced explosive growth in recent years. Large organisations are no longer the only victims of this, as small and medium-sized enterprises are increasingly seen by hackers as easy(er) targets. Since digital threats are constantly changing, it is important to remain vigilant and to continue protecting yourself against a cyber attack.