Braathe join iteam, read more here
BRAATHE SECURITY HUB

Security

Stand in the front line. Protect your data. get yourself insight. Security is more important than ever.

Data security would have stood on the agenda already yesterday

Without an overall plan, users with a healthy security culture and systems on your side, you risk constantly and every day that your data gets lost.

Naivety is perhaps one of the biggest challenges we face in meeting our customers when it comes to security in IT. "My data is of no interest to anyone other than me, is it?" Have you thought about how you can move on in everyday life if, for example, large parts of your data are only available in an encrypted variant that makes them completely useless to you? How many days will it take for your business to really start to suffer in such an operating situation?

Or, what if someone uses your business data to pretend to be just you? And thus gain access to systems at other companies? Sensitive data? Yes, you see the point? Unfortunately, data can often be misused in the hands of unauthorized persons, and this can have very unfortunate consequences for you personally, for your business, your employees and those you do business with. So, what can be done and how can we assist you with this?

Braathes cyber laws

DNT gave us the Mountain Law in 1952 and it has saved many lives, and now we bring you the Cyber ​​Law in 2024. We hope it will prevent cyber attacks in the future!

Do the NIS directives apply to you?

Have you heard of the NIS directives? Who do they really apply to? What should you do if they apply to you? The EU's directives on digital security create many questions across all industries in Norway. That is why we have collected all the answers we have in one place. Learn more about the NIS directives with us!

Sharpened to in a sharpened situation

National Security Authority: Cyber ​​attacks have become commonplace

Over the past six months, several large Norwegian businesses have become extra exposed to cyber attacks. Especially since the war between Russia and Ukraine broke out, attacks have also been carried out in other countries - but no one has reported lasting consequences. Attacks nevertheless quickly create insecurity in the population and can thus also contribute negatively through influence and by drawing us in as an actor and pawn in ongoing political situations.

Businesses should step up preparedness and general vigilance. NSM has prepared checklist for this which is on their website

Recommended measures from NSM

  • Have an overview of the systems
  • Have good and secure backup (crypto-secure backup)
  • Have control over the vulnerability surfaces
  • Control users and user access
  • Strengthen monitoring and logging
  • Better safety culture for employees
  • Be prepared for incidents and have a contingency plan
  • Have control over suppliers and dependencies
  • Also protect cloud services

DDoS, CEO fraud, bots, MFA, SSL? What do all these things mean?

Do you sometimes wonder what various words and terms used in connection with cyber security really mean? Our dictionary is here to help you with just this.

Security dictionary

Become one of many conscious customers

Molteberg Nilsen

Braathe has contributed well with tips on how our digital security can be even better. We are experts in law, and we know how important it is to bring in experts in other fields when we see it necessary.
Hedda Molteberg Nilsen, Managing Director
The law firm Molteberg Nilsen

Want your business survive a cyber attack?

The question is one of the first you should ask yourself when considering which security solution you should go for. Not must/must not, but what actual measures must be put in place. This is the choice you cannot afford to delay.

  • Contingency plan for IT

    When something goes wrong, you should preferably have an IT contingency plan ready.
  • Are you afraid of being hacked?

    Our fear of things is often rooted in the fact that we don't quite know what's going on or how things work.
  • How to spot phishing: 7 things to look for

    We have never been more dependent on e-mails, messages and online services for communication at work than now. How to protect yourself!

Just watching everything dark out?

Create awareness, build your own security.

The picture we paint may seem dark, but the reality is that attempted data breaches, data abuse and fraudulent profiting on other people's valuable data are a very active part of the world's digital everyday life.

Thousands of attack attempts occur every single day, millions of emails with so-called dangerous content are distributed every year. A large majority of these are stopped in effective spam filters and anti-virus systems.

 

But, in a changing world, where data has become currency and data is the lifeblood of everything from production lines to financial transactions, from home in your private sphere and up to the global level, it is becoming increasingly important to focus on securing precisely the data that are essential to you.

Proactivity and the finger in the ground are absolutely essential in this fight. We want to contribute here with insight and knowledge about security for your data, for your users and what if the unthinkable should actually happen. Visit our safety hub regularly. Then you can proudly stand in the front line. And protect your data.

Read more about our collaboration with Pistachio here – the service for security training of your users!

When numbers and statistics show that human error is the number one cause of successful attacks, we obviously have to work on the human factor. It's great that Braathe, together with Pistachio, can help create safer users and increase awareness of their own role as part of the company's defence.

Bård Eirik Lyche
CISO, Braathe