To get the best help for your situation, first answer the questions on the guide's start page.
Information security
Get an overview of information security
Information security includes the identification of threats, protection, the observation and handling process, and recovery from security breaches.
Identify threats
Scams that resemble phishing and un-updated equipment are the most common security risks organisations face.
Shield against threats
Particular attention must be paid to threats to critical functions.
Implement observation and handling processes
Monitor the use of the systems. Track, report, and process breaches. Reduce harm. Ensure that the processes are operational in case of deviations.
Recovery from security breaches
Follow the disaster recovery plan and communicate about recovery actions. Learn from what happened and develop protection processes. Measure success.
Use instructions and tools
What to do in the event of an attack? How to improve the organisation’s cybersecurity?
Learn more about courses and services
Take advantage of training courses and services and participate in peer networks. Practice information security processes.