shutterstock_274821560 (1)

How to make your employees aware of the importance of secure information processing

Some organisations are already GDPR compliant, others still have work to do to meet the legal requirements. To achieve this, a set of technical and organisational measures is required. There are many step-by-step plans on the Internet to help you with these measures. It is even more important yet to raise the awareness among your organisation’s employees. This is very […]

Read more
shutterstock_219503161 (1)

What is the difference between personal data and privacy-sensitive information?

The GDPR is a hot topic. Due to all messages in the media, many myths circulate about this topic. A frequently-heard comment is: but it is related to privacy, and so it is forbidden under the GDPR anyway, right? To understand correctly what the law requires and what are the reasons for that, you should know what personal data are and how this differs from […]

Read more
shutterstock_675065458 (1)

Data and human errors: Where does it go wrong?

People make a mistake every 200-20,000 actions. So when humans play a role in a system, it is very likely they make mistakes. Like writing ‘2017’ for instance, when it should be ‘2018’, forgetting their keys, calling somebody by the wrong name. These things happen, after all, you cannot make an omelette without breaking eggs. Most people spend a large part of their […]

Read more

The email consult: from a matter of expense to a matter of profit

Research from NICTIZ/NIVEL and Pharmapartners shows that just 3% of the Dutch has had an email consult with his physician. This percentage decreases even further in the second line (hospitals and other medical facilities) to a figure virtually zero. There is a chance that this will change. Since January 2018 an email consult can be declared to the insurer for the same […]

Read more

The 3 most important things you need to account for in order to become GDPR compliant

The General Data Protection Regulation (GDPR) is a European law that protects the privacy of European citizens on the one side and helps to create awareness in processing personal information on the other. Thanks to GDPR, CISO’s like you have a lot of extra work to do. The amount of administrative proceedings that result from the GDPR is huge, your organisation […]

Read more
Untitled design

4 misconceptions about safe email

The European General Data Protection Regulation (GDPR) made the topic of privacy protection an important agenda item for every company. Almost all the time, risk analysis brings up email traffic as a very risky part. In the meantime however, I often encounter organisations that are pretty sure in their statement that the have their email traffic safe and under control. […]

Read more

Three steps to help your colleagues prevent data leaks

Human errors are by far the most important cause for data leaks. According to information security specialist Daan Koot these errors are caused by both employees and employers. How can organisation limit the amount of human error with sensitive information? […]

Read more
blog emailuitdagingen 1000x500

Why email entails major risks under the GDPR

In 2017 more than 10.000 data leaks occurred. More than half of these leaks was caused by human error.  […]

Read more

Which type of 2FA do I need to use under the GDPR in the Netherlands?

It happens on a daily basis: a client has completed treatment and the associated data needs to be transferred. And the data transfer needs to be secure. How do you make that happen? In order to hand off client data to the next step in the process, the nurse will have to send the client’s file to another organisation. This file contains quite a lot of information, […]

Read more
blog melden datalekken 1200x600

Reporting a data leak: what steps do you need to take?

You always hope that you’ll never have to use the information in this article, because if you do, then you most probably have had a data leak. Unfortunately, it is not a question of whether a data leak will take place in your organisation, but rather a matter of when. It’s wise to prepare for that contingency. These steps will ensure that you won’t miss a thing when […]

Read more
shutterstock_324371054 (1)

Make your municipality GDPR-compliant: 3 to dos

A large number of administrative actions ensue from the General Data Protection Regulation (in Dutch AVG, in English GDPR) your organisation is still resisting and time is running out. Organisations must bring their operations in line with the GDP before 25 May 2018. […]

Read more

How can you quickly prevent a fine under the GDPR?

The General Data Protection Regulation (GDPR) provides for sky-high fines for organisations that are careless when handling personal data. What essential measures can you take immediately to prevent such a fine? […]

Read more

Five trends to pay extra attention to in the year of the GDPR

You can't have failed to notice: the GDPR (General Data Protection Regulation, in Dutch 'de Algemene Verordening Gegevensbescherming') has come into effect. There are stricter rules in place regarding the protection of personal data. The penalties for violating the privacy rules are a lot higher. […]

Read more

Data leaks: three of the most important human causes

Since January 2016 there is a duty to report data leaks. This means that companies have to inform the authorities as soon as a data leak occurs. Just in 2017 10000 leaks have been registered, most of which came from health care institutions, financial services and public administration. […]

Read more

5 practical tips for sharing personal data securely

Sharing privacy-sensitive data does not have to be complex. These five practical tips can help you make the way in which your organisation shares personal data a lot more secure. […]

Read more

5 'security excuses' that make each email a potential data breach

It is important that you always send personal data securely. That awareness is increasingly present on the work floor. Nevertheless, ZIVVER directors Rick and Wouter still hear numerous irrational arguments for not applying this rule. Which of these 'security excuses' do they hear most frequently? Wouter discusses them one by one. […]

Read more
door-green-closed-lock (1)-1

2FA: what is it and why would you use it?

If you do some research in online security, changes are the term 2FA will pop up. Although the term is unknown to many people, it is likely that they encounter this technique on a daily basis. For instance when they use online banking or when working on a corporate network. This article will tell you what 2FA is, how it works and which gains it provides you. […]

Read more
Untitled design (2)

Encryption for beginners 2: PGP and hashing

If you want to prevent the wrong people from gaining access to an email with sensitive personal data, you cannot do without encryption. An interesting subject, but a complex one for those who do not come into contact with it on a daily basis. That is why we gave you a short introduction earlier (Encryption for Beginners 1) in which we discussed symmetric and asymmetric […]

Read more
Untitled design (1)

Encryption for beginners 1: (A)symmetric encryption

Most people do not realise how easily an email can arrive at the wrong recipient. A typo in the address, a mistake in the configuration of a server, the wrong name from the address book: they are all simple mistakes. And there is always the risk of hackers breaking into a provider's email server and thus gaining access to the email of all the users on that system. You […]

Read more