Author portrait of Stephanie van Wissen, editor & copywriter at ON2IT.

Author

Stephanie van wissen

Stephanie van Wissen is Editor and Copywriter at ON2IT. She has a background in communications and marketing. She loves to write, as well as explore other creature pursuits, such as TTRPGs and digital art.

LinkedIn

Blogs By Stephanie van Wissen

As a CISO, or a head of IT: how do you appeal to the board to make sure they understand the value of good cybersecurity? In this blog, we offer some guidelines in the shape of a fictional speech to the board. Thank you for giving me the opportunity to address you as the Chief … Read more
The shortage of staff in the IT market is nothing new: companies struggle to find and maintain good IT staff, a lack of specific knowledge and skills amongst IT staff makes a large number of job ads hard to fill and it’s becoming more and more normal to regularly switch jobs.
Return on Investment (ROI) in the context of cybersecurity measures is a hot subject. Which makes sense, as technology providers don’t want to position cybersecurity as a cost with no return. But how accurate is that discussion?
Software has vulnerabilities that provide hackers with the opportunity to steal data, install ransomware or sabotage your business. Criminal organizations and intelligence services are willing to pay a lot of money for vulnerabilities that (almost) no one knows about. Big bucks (or rather, cryptos) are paid for these zero-days on the so-called dark web, because they offer you an open backdoor just for you
A partner who just collects alerts and then makes leaves fixing the problem in your hands, doesn’t actually get you anywhere. It’s comparable to a security service that sends you a quick message: we received a report of a break-in at your office: good luck with that!
Strangely, most companies, including larger organizations, have set up their cybersecurity according to the above pager duty model. Truly incomprehensible, as cold statistics tell you that ransomware, data theft or cyber sabotage are a great threat to continuity than the traditional calamities that we do adequately deal with.
By combining the Polar Flow data with social media profiles and other public information, Dutch journalists, together with the Bellingcat network for citizen journalism, were able to find names, addresses and photos of no less than 6460 individuals.