Cybersecurity

Cybersecurity

How to convince your board to switch governance platform

Written by Admincontrol
No matter how complex the organisation and its policies and processes, effective governance comes down to one factor – ensuring the right people have the right information at the right time to drive informed decision...
Cybersecurity

Passkeys, passwords or passphrases?

Written by Admincontrol
How do you secure your accounts and how do you create strong passwords? In this article we will give you some tips and tricks.

Educate yourself on the latest news from Admincontrol.

Subscribe

Subscribe

Stay up to date with the latest from Admincontrol.

Cybersecurity M&A

Overcoming compliance hurdles in M&As

Written by Mari Nygaard
As compliance issues become embedded into the due diligence process, especially for cross-border transactions, dealmakers face a growing set of challenges to avoid delays and deal abandonment.
Data Room & Due Diligence Cybersecurity

The impact of ESG due diligence and cybersecurity risk management in Europe’s M&As

Written by Mari Nygaard
Europe’s dealmakers have overcome many challenges in recent years. Deal timelines were extended by the impact of the COVID-19 pandemic; technology was adopted at an unprecedented speed, and, more recently, other issues,...
Cybersecurity

Cyber due diligence: Five features to look for

Written by Mari Nygaard
We live in a time with accelerated digitalisation. Processes that we used to handle manually are now digitised. It has not only been a necessity. This digitalization also presents vast opportunities to work more...
Cybersecurity

Cybersecurity: How secure are your board documents?

Written by Admincontrol
The events the last few years leaves little doubt that cybersecurity needs to be on the board’s agenda, as well as ensuring they have a secure means for communication and collaboration, such as a board portal.
Cybersecurity

3 myths about Two-Factor-Authentication that are impacting adoption

Written by Admincontrol
Two Factor-Authentication (2FA) introduces a second level of verification that is one of the most effective ways to protect against password breaches. Yet despite this we still see many scare stories about low adoption...
Load more articles