To get the best help for your situation, first answer the questions on the guide's start page.
VAHTI best practices
Digital security risk management- Guide's start page
- Introduction to digital security risk management
- Risk management
- Safety and security management
- Continuity management and preparedness
- Information security
- Data protection
- Checklist
Identify threats

What are the most common information security risks?
Never trust, always verify.
- Zero Trust model
The most common information security risks are related to scams attempting to persuade individuals to disclose sensitive data that can be used to cause harm to individuals or organisations.
Examples of such information include user IDs or passwords that a scammer might try to gain through phishing messages.
Other common information security risks include un-updated equipment and related vulnerabilities.
Updated: 29/10/2024
Identify the operating environment and critical targets
Knowing the operating environment and classifying critical targets are useful as they help your organisation save and allocate resources. Below you can familiarise yourself with Traficom’s Hyöky and Cybermeter services.
Updated: 29/10/2024
In addition to the technical information security of data systems, information security also includes the human side. Social engineering is an intelligence tactic that exploits human weaknesses, which criminals use to gain access to sensitive data or otherwise adversely affect the organisation’s operations through a user. This manipulation often targets knowledge workers using the organisations’ data systems.