Suomi.fi for Service Developers
Go directly to contents.
VAHTI best practices
Digital security risk management

To get the best help for your situation, first answer the questions on the guide's start page.

Identify threats

What are the most common information security risks?

Never trust, always verify.

- Zero Trust model

The most common information security risks are related to scams attempting to persuade individuals to disclose sensitive data that can be used to cause harm to individuals or organisations.

Examples of such information include user IDs or passwords that a scammer might try to gain through phishing messages.

Other common information security risks include un-updated equipment and related vulnerabilities.

Updated: 29/10/2024

Identify the operating environment and critical targets

Knowing the operating environment and classifying critical targets are useful as they help your organisation save and allocate resources. Below you can familiarise yourself with Traficom’s Hyöky and Cybermeter services.

Updated: 29/10/2024

Are you satisfied with the content on this page?

Checklist