Volg ICTI

Blog Security

Changes in CISSP: 2021 versus 2018

In April 2020, we wrote an article on the then current 2018 version of the Certified Information Systems Security Professional (CISSP) Body of Knowledge and provided a free study template. Technology evolves in a rapid pace, and with that the risks to an organisation’s information assets. The capabilities of and tools available to malicious actors…

Joost Krapels

How to improve your internet.nl score

Internet.nl is a service, co-created by the Dutch Government, for measuring the security of your website. The tool summarises many security aspects into two simple scores: one for websites and one for email. We use the service quite a lot, both for ICT Institute and our clients. Each score is between 0% and 100%. If…

Joost Krapels

Access Management: an introduction

Identity and Access Management, or IAM for short, is one of the cornerstones of Information Security. Organisations cannot protect the confidentiality, itegrity and availability of information entrusted to them if it can be seen, altered and deleted by anyone who simply desires to do so. In Information Security, we call the sequential steps required for…

Joost Krapels

ISO 31000 in relation to ISO 27001

Risk management plays a very important role in an ISO 27001 Information Security Management System (ISMS). At the end of paragraph 6.1 “Actions to address risks and opportunities” there is however a reference to a fairly unknown norm ISO 31000. What is the relationship between ISO 31000 and ISO 27001? In this blog we briefly…

Jelle Hoekstra

Ransomware in the Covid-19 era

Ransomware has been a well-known phenomenon for a while, but in recent weeks, increased activity has been observed due to the corona crisis. It is currently very busy at healthcare institutions and staff are working overtime under stress. Attackers try to take advantage of the situation. For example, we received input from a hospital, where…

Floris van den Broek