The email consult: from a matter of expense to a matter of profit

Research from NICTIZ/NIVEL and Pharmapartners shows that just 3% of the Dutch has had an email consult with his physician. This percentage decreases even further in the second line (hospitals and other medical facilities) to a figure virtually zero. There is a chance that this will change. Since January 2018 an email consult can be declared to the insurer for the same […]

Read more
vlag3

The 3 most important things you need to account for in order to become GDPR compliant

The General Data Protection Regulation (GDPR) is a European law that protects the privacy of European citizens on the one side and helps to create awareness in processing personal information on the other. Thanks to GDPR, CISO’s like you have a lot of extra work to do. The amount of administrative proceedings that result from the GDPR is huge, your organisation […]

Read more
Untitled design

4 misconceptions about safe email

The European General Data Protection Regulation (GDPR) made the topic of privacy protection an important agenda item for every company. Almost all the time, risk analysis bring up email traffic as a very risky part. In the meantime however, I often encounter organisation that are pretty sure in their statement that the have their email traffic safe and under control. […]

Read more
blog-datalekken-in-drie-stappen2

Three steps to help your colleagues prevent data leaks

Human errors are by far the most important cause for data leaks. According to information security specialist Daan Koot these errors are caused by both employees and employers. How can organisation limit the amount of human error with sensitive information? […]

Read more
blog emailuitdagingen 1000x500

Why email entails major risks under the GDPR

A data leak in October 2017 exposed the personal data of 95,000 customers of the ANWB roadside assistance association. It was a very regrettable situation for the ANWB, of course. The leak was caused by human error. A web shop supplier apparently used the wrong settings on a data filter. […]

Read more
shutterstock_304936613

Which type of 2FA do I need to use under the GDPR in the Netherlands?

It happens on a daily basis: a client has completed treatment and the associated data needs to be transferred. And the data transfer needs to be secure. How do you make that happen? In order to hand off client data to the next step in the process, the nurse will have to send the client’s file to another organisation. This file contains quite a lot of information, […]

Read more
blog melden datalekken 1200x600

Reporting a data leak: what steps do you need to take?

You always hope that you’ll never have to use the information in this article, because if you do, then you most probably have had a data leak. Unfortunately, it is not a question of whether a data leak will take place in your organisation, but rather a matter of when. It’s wise to prepare for that contingency. These steps will ensure that you won’t miss a thing when […]

Read more
shutterstock_324371054 (1)

Make your municipality GDPR-compliant: 3 to dos

A large number of administrative actions ensue from the General Data Protection Regulation (in Dutch AVG, in English GDPR) your organisation is still resisting and time is running out. Organisations must bring their operations in line with the GDP before 25 May 2018. […]

Read more
blog-hoe-voorkom-je-snel-een-GDPR-boete

How can you quickly prevent a fine under the GDPR?

The General Data Protection Regulation (GDPR) provides for sky-high fines for organisations that are careless when handling personal data. What essential measures can you take immediately to prevent such a fine? […]

Read more
man-holding-ipad-1200x600

Five trends to pay extra attention to in the year of the GDPR

You can't have failed to notice: the GDPR (General Data Protection Regulation, in Dutch 'de Algemene Verordening Gegevensbescherming') has come into effect. There are stricter rules in place regarding the protection of personal data. The penalties for violating the privacy rules are a lot higher. […]

Read more
blog221-1

Data leaks: three of the most important human causes

Since January 2016 there is a duty to report data leaks. This means that companies have to inform the authorities as soon as a data leak occurs. Just in 2017 10000 leaks have been registered, most of which came from health care institutions, financial services and public administration. […]

Read more
blog-image-info-delen-960x398

5 practical tips for sharing personal data securely

Sharing privacy-sensitive data does not have to be complex. These five practical tips can help you make the way in which your organisation shares personal data a lot more secure. […]

Read more
blog-image-security-smoesjes-1

5 'security excuses' that make each email a potential data breach

It is important that you always send personal data securely. That awareness is increasingly present on the work floor. Nevertheless, ZIVVER directors Rick and Wouter still hear numerous irrational arguments for not applying this rule. Which of these 'security excuses' do they hear most frequently? Wouter discusses them one by one. […]

Read more
door-green-closed-lock (1)-1

2FA: what is it and why would you use it?

If you do some research in online security, changes are the term 2FA will pop up. Although the term is unknown to many people, it is likely that they encounter this technique on a daily basis. For instance when they use online banking or when working on a corporate network. This article will tell you what 2FA is, how it works and which gains it provides you. […]

Read more
Untitled design (2)

Encryption for beginners 2: PGP and hashing

If you want to prevent the wrong people from gaining access to an email with sensitive personal data, you cannot do without encryption. An interesting subject, but a complex one for those who do not come into contact with it on a daily basis. That is why we gave you a short introduction earlier (Encryption for Beginners 1) in which we discussed symmetric and asymmetric […]

Read more
Untitled design (1)

Encryption for beginners 1: (A)symmetric encryption

Most people do not realise how easily an email can arrive at the wrong recipient. A typo in the address, a mistake in the configuration of a server, the wrong name from the address book: they are all simple mistakes. And there is always the risk of hackers breaking into a provider's email server and thus gaining access to the email of all the users on that system. You […]

Read more