In the health and welfare sector, many entrepreneurs and employees are not skilled in information and cybersecurity, even when they are constantly dealing with sensitive data. This case study research examines a team of private Finnish podiatrists and their cybersecurity capabilities. The goal of the study is to gather the most important information and cybersecurity topics and create an easy to-read guide that helps businesses find the framework for their information and cybersecurity and address it in more detail. The results of the case study show that the target organization's most important information and cybersecurity areas are phishing, secure environment, secure communication, passwords, software updates, backups, and physical secu...
This thesis was made on inspiration and interest gathered in author’s internship placement in IT bus...
PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a ...
This report studies the impact of cyber security attacks its initial use and develop mechanisms for ...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
The proliferation of information and communication technologies in enterprises enables them to devel...
Introduction Healthcare data have significant value as a potential target for hackers. Phishing is a...
In the most recent years, the healthcare industry has become the most targeted attacking by cybercri...
Cybercrime is on the rise. Attacks by hackers, organized crime and nation-state adversaries are an e...
Master's thesis in Cyber security (IS507)Cyberattack incidents against small to medium-sized enterpr...
The purpose of this study was to identify the team behaviors that cybersecurity professionals should...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into g...
Due to a mass penetration of information technologies into all business processes, researches in are...
This paper is about cybersecurity in today’s world. Cybersecurity is the area of information securit...
Finland’s cyber security strategy states that Finland has to be capable of protecting the vital func...
This thesis was made on inspiration and interest gathered in author’s internship placement in IT bus...
PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a ...
This report studies the impact of cyber security attacks its initial use and develop mechanisms for ...
[[abstract]]Organizations that lack security awareness can miss detecting many obvious security risk...
The proliferation of information and communication technologies in enterprises enables them to devel...
Introduction Healthcare data have significant value as a potential target for hackers. Phishing is a...
In the most recent years, the healthcare industry has become the most targeted attacking by cybercri...
Cybercrime is on the rise. Attacks by hackers, organized crime and nation-state adversaries are an e...
Master's thesis in Cyber security (IS507)Cyberattack incidents against small to medium-sized enterpr...
The purpose of this study was to identify the team behaviors that cybersecurity professionals should...
MBA, North-West University, Vanderbijlpark CampusAs is the case with many organisations worldwide, b...
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into g...
Due to a mass penetration of information technologies into all business processes, researches in are...
This paper is about cybersecurity in today’s world. Cybersecurity is the area of information securit...
Finland’s cyber security strategy states that Finland has to be capable of protecting the vital func...
This thesis was made on inspiration and interest gathered in author’s internship placement in IT bus...
PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a ...
This report studies the impact of cyber security attacks its initial use and develop mechanisms for ...