To get the best help for your situation, first answer the questions on the guide's start page.
- Guide's start page
- Introduction to digital security risk management
- Risk management
- Safety and security management
- Continuity management and preparedness
- Information security
- Get an overview of information security
- Information security secures data, systems and operations
- Ensuring information security is the responsibility of the entire organisation
- Information security glossary
- The security environment is constantly changing
- Get to know the legislation
- Security breaches can have serious consequences
- Communicate the roles and responsibilities to the employees
- Use services and tools
- Identify threats
- Shield against threats
- Implement observation and handling processes
- Recovery from security breaches
- Use instructions and tools
- Learn more about courses and services
- Get an overview of information security
- Data protection
- Checklist
Get an overview of information security
Information security secures data, systems and operations
Information security means securing data, systems and operations Information security principles include
- confidentiality
- integrity
- availability.
Ensuring information security is the responsibility of the entire organisation
Information security ensures the availability, confidentiality and integrity of information. Everyone in an organisation must have a general understanding of the organisation’s information security
- principles
- key processes
- roles
- responsibilities.
Information security glossary
Below you can find some of the key concepts and definitions related to information security.
The security environment is constantly changing
Technology and the digital operating environment are developing rapidly. To keep up with the development, each organisation must develop
- safety culture
- staff competence
- their observation skills and
- risk management.
The security environment related to information security is constantly changing, for example, in the following ways:
- organisations adopt new systems and services
- supply and service chains become more complex
- technological solutions related to the handling of information security threats are evolving
- technological solutions related to cybercrime are evolving.
Get to know the legislation
- Act on the Openness of Government Activities (in Finnish)Opens in a new window.
- Act on Information Management in Public Administration (in Finnish)Opens in a new window.
- Act on the Operation of the Government Security Network (in Finnish)Opens in a new window.
- Government Decree on Security Classification of Documents in Central Government (in Finnish)Opens in a new window.
- Act on International Information Security Obligations (in Finnish)Opens in a new window.
- Act on Information Security Inspection Bodies (in Finnish)Opens in a new window.
- Act on the Assessment of the Information Security of Authorities’ Information Systems and Data Communication Systems (in Finnish)Opens in a new window.
- Act on the European Centre of Excellence for Countering Hybrid Threats (in Finnish)Opens in a new window.
Read more about legislation related to digital safety and security in this guide’s section Read more about legislation related to preparedness.
Security breaches can have serious consequences
In the event of security breaches, costs are incurred for their management, reporting and correction. In addition to the organisation, security breaches can have significant consequences on its
- human resources
- managers
- customers and
- stakeholders.
At worst, security breaches can lead to extensive human suffering, significant compensation obligations and even bankruptcy of the organisation.
Read more about what benefits taking care of digital security offers for organisations on the guide’s page Identify the benefits.
Communicate the roles and responsibilities to the employees
Information security risks are managed and the organisation’s perception capacity is developed by actively communicating with the staff about
- information security roles and responsibilities, and
- the processes related to responsibilities.
Use services and tools
You should use available services and tools for information security risk management.
Examples of tools and services for organisations:
- Digiturvan kokonaiskuvapalvelu (Digital and Population Data Services Agency, in Finnish)Opens in a new window.
- Julkisen hallinnon tietoturvallisuuden arviointikriteeristö (Julkri) (Ministry of Finance, in Finnish, PDF)Opens in a new window.
- VAHTI good practices, tools and templates (Digital and Population Data Services Agency)Opens in a new window.
- Hyöky-palvelu (National Cyber Security Centre, in Finnish)Opens in a new window.
- Havaro service (Finnish Transport and Communications Agency Traficom)Opens in a new window.
- Cybermeter (National Cyber Security Centre)Opens in a new window.
- Cyber Weather (National Cyber Security Centre), in FinnishOpens in a new window.
Also familiarise yourself with the Digital security service catalogueOpens in a new window. (in Finnish).