Blogs

Let’s get inspired by our blog!

What’s the recommended frequency for a cyber security assessment?

We regularly publish blogs and articles about carrying out security assessments. About how important that is in order to gain insight into the status of the organization’s cyber security, and to proactively address its security policy. In addition, we keep insisting that conducting an assessment is not a one-off, but must be repeated periodically in order to keep a close watch, and to always stay one step ahead of cybercriminals.

How do you prevent desire paths from endangering your governance?

Employees frequently use alternative methods, often referred to as “desire paths,” to expedite prescribed work processes. While these methods can enhance efficiency, they also introduce cybersecurity risks. These methods often remain invisible to IT administrators and are thus not adequately secured. Yet, alternative methods can also present opportunities. This blog uncovers how your organization can incorporate these practices into your governance plan, consequently establishing a safer and more efficient way of working.

Ella Gud – global partner manager, world traveler and artist

In this series we introduce our team to you one by one. What is their role within QS solutions? Who are they as a person? Why are they a match with the organization? And what do they actually do in their spare time? This will give you, as a customer, business partner or new colleague, an idea of ​​the people behind our logo!

The 10 advantages of a cyber security scan

Cybercrime has experienced explosive growth in recent years. Large organisations are no longer the only victims of this, as small and medium-sized enterprises are increasingly seen by hackers as easy(er) targets. Since digital threats are constantly changing, it is important to remain vigilant and to continue protecting yourself against a cyber attack.