All it takes is one human error to compromise your organization's reputation

Professionals understand the value of their companies' reputation. Firms with a powerful and positive reputation attract better employees, partners, and clients. They're regarded as offering additional value, which usually allows them to impose a premium. Customers tend to be more dedicated and purchase broader ranges of services and products. As the industry believes […]

Read more
The User Representatives - Always here to help you!

The User Representatives - Always here to help you!

  At ZIVVER the success of our customers is paramount! For that reason, we have a dedicated Customer Success team to help our customers maximize their value from our product. Part of the Customer Success team are the User Representatives. Their ultimate goal is to create happy ZIVVER users, by solving all issues, providing information and representing their voice […]

Read more
Your_Success_our_primary Mission_The Customer Success team_ZIVVER_EN_blog

Your Success, our primary Mission! - The Customer Success team

At ZIVVER the success of our customers is paramount! Our purpose is to add real value to your organization. That’s nothing new, but now we even have a dedicated Customer Success team to help you achieve your desired goals with our product.  […]

Read more
Corporate_guest_branding_secure_email_powered_by_ZIVVER_but with_your_organizations_visual_identity_blog_eng-1

Corporate guest branding: Secure email powered by ZIVVER but with your organization's visual identity

Your organization has its own visual identity and naturally wishes to have it reflected in all its products and services. That includes the secure email environment provided by ZIVVER. Therefore, organizations can personalize ZIVVER's guest experience in several ways.  […]

Read more


With the inception of the GDPR in May 2018, several companies and their offices were not, and many are still not ready to be compliant with the enhanced European privacy rules and were scared for the potential high penalty payments. This fear was not without grounds. […]

Read more
Introducing-open-conversation-starters-A powerful-new-feature-live on ZIVVERs-platform-blog-eng

Introducing open conversation starters! A powerful new feature from ZIVVER.

One of ZIVVER's most convenient and unique features is the conversation starter. It allows people who don't have an account (guest users) to take the initiative for a conversation with a ZIVVER user, in the same secure email environment. It protects both senders and recipients from possible data leaks caused by guest users. […]

Read more

Human error while emailing might be disastrous for your organization - Prevention is much simpler than you think!

  If hackers and cybercriminals are your biggest concern when it comes to cybersecurity, it might be time to look somewhere else for the cause of the vast majority of data leaks. It is well documented that the actual offender is that lovely and well-intended colleague sitting right next to you, and not a malicious individual in North Korea like the media often […]

Read more
Sending_or_receiving_credit_card_data_via_email_while staying_PCI_compliant

Sending or receiving credit card data via email while staying PCI compliant

To prevent cardholders’ information from falling into the wrong hands, the Payment Card Industry Data Security Standard (PCI DSS) was established to hold organizations to a common standard for securing cardholder information against unauthorized exposure and exploitation. […]

Read more
We_are_happy_to_introduc _ou _new_VP_of_sales_Chris_Brown_ZIVVER_eng_blog_update

We are happy to introduce our new VP of Global Sales: Chris Brown

"ZIVVER is entering new markets at high speed. We intend to lead in those markets. With Chris, we bring in a senior leader who has done this before multiple times. We love that he is not ‘just’ about sales. Chris has a deep, hands-on understanding of the problems our customers face and of the market space and a very inspirational and credible leader for our fast […]

Read more
Cloud_based_office_support tools_that_are_U.S._rooted_fail GDPR_complianc_ZIVVER_Eng_blog

Cloud-based office support tools that are U.S. rooted, fail GDPR compliance

It is estimated that the U.S.A. supplies 80% of the global cloud computing services. And nearly all most-used cloud-based solutions for email and word processing are from the US. This causes a big issue for European companies using these vendors since they are not GDPR compliant. This is the conclusion of a research performed by the Swedish National Public Procurement […]

Read more
Idans welcome blog (2)

We are happy to announce our Chief Technology Officer: Idan York.

Idan will be responsible for vision outlining and implementation of technological strategies that align with ZIVVER’s expansion objectives. […]

Read more
Human_error_is_the_primary_cause_of_most_data_leaks_The_Dutch_lend_a_helping_hand_pointing_ out_the_cause_ZIVVER_EN_blog-1

Human error is the primary cause of most data leaks. The Dutch lend a helping hand pointing out the causes


Read more
shutterstock_274821560 (1)

How to make your employees aware of the importance of secure information processing

Some organisations are already GDPR compliant, others still have work to do to meet the legal requirements. To achieve this, a set of technical and organisational measures is required. There are many step-by-step plans on the Internet to help you with these measures. It is even more important yet to raise the awareness among your organisation’s employees. This is very […]

Read more
shutterstock_219503161 (1)

What is the difference between personal data and privacy-sensitive information?

The GDPR is a hot topic. Due to all messages in the media, many myths circulate about this topic. A frequently-heard comment is: but it is related to privacy, and so it is forbidden under the GDPR anyway, right? To understand correctly what the law requires and what are the reasons for that, you should know what personal data are and how this differs from […]

Read more
shutterstock_675065458 (1)

Data and human errors: Where does it go wrong?

People make a mistake every 200-20,000 actions. So when humans play a role in a system, it is very likely they make mistakes. Like writing ‘2017’ for instance, when it should be ‘2018’, forgetting their keys, calling somebody by the wrong name. These things happen, after all, you cannot make an omelette without breaking eggs. Most people spend a large part of their […]

Read more

The email consult: from a matter of expense to a matter of profit

Research from NICTIZ/NIVEL and Pharmapartners shows that just 3% of the Dutch has had an email consult with his physician. This percentage decreases even further in the second line (hospitals and other medical facilities) to a figure virtually zero. There is a chance that this will change. Since January 2018 an email consult can be declared to the insurer for the same […]

Read more

The 3 most important things you need to account for in order to become GDPR compliant

The General Data Protection Regulation (GDPR) is a European law that protects the privacy of European citizens on the one side and helps to create awareness in processing personal information on the other. Thanks to GDPR, CISO’s like you have a lot of extra work to do. The amount of administrative proceedings that result from the GDPR is huge, your organisation […]

Read more
Untitled design

4 misconceptions about safe email

The European General Data Protection Regulation (GDPR) made the topic of privacy protection an important agenda item for every company. Almost all the time, risk analysis brings up email traffic as a very risky part. In the meantime however, I often encounter organisations that are pretty sure in their statement that the have their email traffic safe and under control. […]

Read more

Three steps to help your colleagues prevent data leaks

Human errors are by far the most important cause for data leaks. According to information security specialist Daan Koot these errors are caused by both employees and employers. How can organisation limit the amount of human error with sensitive information? […]

Read more
blog emailuitdagingen 1000x500

Why email entails major risks under the GDPR

In 2017 more than 10.000 data leaks occurred. More than half of these leaks was caused by human error.  […]

Read more

Which type of 2FA do I need to use under the GDPR in the Netherlands?

It happens on a daily basis: a client has completed treatment and the associated data needs to be transferred. And the data transfer needs to be secure. How do you make that happen? In order to hand off client data to the next step in the process, the nurse will have to send the client’s file to another organisation. This file contains quite a lot of information, […]

Read more
blog melden datalekken 1200x600

Reporting a data leak: what steps do you need to take?

You always hope that you’ll never have to use the information in this article, because if you do, then you most probably have had a data leak. Unfortunately, it is not a question of whether a data leak will take place in your organisation, but rather a matter of when. It’s wise to prepare for that contingency. These steps will ensure that you won’t miss a thing when […]

Read more
shutterstock_324371054 (1)

Make your municipality GDPR-compliant: 3 to dos

A large number of administrative actions ensue from the General Data Protection Regulation (in Dutch AVG, in English GDPR) your organisation is still resisting and time is running out. Organisations must bring their operations in line with the GDP before 25 May 2018. […]

Read more

How can you quickly prevent a fine under the GDPR?

The General Data Protection Regulation (GDPR) provides for sky-high fines for organisations that are careless when handling personal data. What essential measures can you take immediately to prevent such a fine? […]

Read more

Five trends to pay extra attention to in the year of the GDPR

You can't have failed to notice: the GDPR (General Data Protection Regulation, in Dutch 'de Algemene Verordening Gegevensbescherming') has come into effect. There are stricter rules in place regarding the protection of personal data. The penalties for violating the privacy rules are a lot higher. […]

Read more

Data leaks: three of the most important human causes

Since January 2016 there is a duty to report data leaks. This means that companies have to inform the authorities as soon as a data leak occurs. Just in 2017 10000 leaks have been registered, most of which came from health care institutions, financial services and public administration. […]

Read more

5 practical tips for sharing personal data securely

Sharing privacy-sensitive data does not have to be complex. These five practical tips can help you make the way in which your organisation shares personal data a lot more secure. […]

Read more

5 'security excuses' that make each email a potential data breach

It is important that you always send personal data securely. That awareness is increasingly present on the work floor. Nevertheless, ZIVVER directors Rick and Wouter still hear numerous irrational arguments for not applying this rule. Which of these 'security excuses' do they hear most frequently? Wouter discusses them one by one. […]

Read more
door-green-closed-lock (1)-1

2FA: what is it and why would you use it?

If you do some research in online security, changes are the term 2FA will pop up. Although the term is unknown to many people, it is likely that they encounter this technique on a daily basis. For instance when they use online banking or when working on a corporate network. This article will tell you what 2FA is, how it works and which gains it provides you. […]

Read more
Untitled design (2)

Encryption for beginners 2: PGP and hashing

If you want to prevent the wrong people from gaining access to an email with sensitive personal data, you cannot do without encryption. An interesting subject, but a complex one for those who do not come into contact with it on a daily basis. That is why we gave you a short introduction earlier (Encryption for Beginners 1) in which we discussed symmetric and asymmetric […]

Read more