In line with the national “Digital Agenda 2020” Dutch municipalities, organised in the VNG (Association of Dutch Municipalities) aim for a common approach for implementing ICT services. This had resulted in the objective by VNG for a common municipal digital [...]
Our society is dependable of information networks. Cyberattacks against cities and municipalities have come alarmingly everyday incidents. In USA there were more 100 ransomware attacks against public administrations (schools and local governments)1. The cost of a single attack can be [...]
During the past 8 months we have deployed and tested the CS-AWARE system in the contexts of the municipalities of Rome and Larissa. We have worked intensively with the users, collected and implemented their feedback, tried to understand how cybersecurity [...]
Much has been said about smaller municipalities and their lack of resources and qualified cybersecurity staff but little about what to do about the problem of helping smaller municipalities. In the UK the Government, as part of the “National Cyber [...]
As an industry, Cybersecurity is flourishing but local and regional governments are suffering due to a lack of resources and qualified staff. Increasingly it’s more difficult for the public sector to attract staff and pay competitive salaries.Cyber attacks are increasing [...]
Until the end of 2020The Network and Information Systems Directive, i.e. the main European cybersecurity legislation, will be revised by the end of 2020 by the European Union. This was announced by the European Commission, presenting the new strategy of [...]
Recently Verizon announced its Data Breach Investigations Report for the year 2020, which includes sixteen different industries and four world regions. A total of 32,002 security incidents were analysed, of which 3,950 were confirmed breaches. According to the findings 45% [...]
Although cybersecurity is one of the biggest challenges of the digital age that is constantly evolving at an extremely fast pace, it also holds great opportunities. The challenges and best practices that organizations must impose to build a cyber-readiness culture [...]
According to ESET, in the first quarter of 2020, the threats from malicious Cryptominers and Android malware decreased, while on the contrary, the online threats increased. Developments in the first quarter were apparently determined by the Covid-19 pandemic. In [...]
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.