Every industry has its own speciality
Previously, cyber-security was a generic term. Nowadays the requirements of organisations have changed as a result of which the substance of the cyber security topic also changes. Initially, there was just cyber-security without specialities, whilst the world of cyber criminality changed from hackers in a basement to organised groups. As a consequence, the requirements of organisations have also changed. This means that there is an increasing need for specialists in the area of cyber-security. Topics like digital intrusion detection, ransomware, and network security, but also the interpretation of specific wishes in the area of GDPR issues or compliance.
Every discipline or sub-discipline of cyber security has a specific focus because cyber criminals specialise in various areas. Some hackers focus on a specific group of ransomware, whilst others search the internet for non-secure end-points. Here on our website we focus on a number of specific industries, however it goes without saying that we are extremely competent in all industries.
HealthcareTo offer every patient or client the maximum care, the sector is innovating and digitalising at a high pace. Tesorion understands the issues and challenges in the healthcare industry and has appropriate and proven solutions available.Read more »
Transport and LogisticsAutomation and digitalisation enable the logistics industry to become more efficient. The downside is that this theme leads to new challenges. Tesorion assists businesses in the logistics industry in becoming secure and resilient in the area of cyber-security.Read more »
FinancialEver more often, banks and insurers become the target of cyber-criminality. At the same time, the rules of, for instance, the ECB and the Solvency II framework and the relevant supervision by DNB become ever more stringent. Tesorion assists in…Read more »
EducationInformation security in the education industry is a major challenge. Developments such as online teaching and Bring Your Own Device ensure that cybersecurity must be properly implemented. After all, only one infected device is needed, which jeopardizes the continuity of…Read more »