Fraud Blocker
Contact

Contact us

We are in the office weekdays from 08:30-16:30. With the hotline open 24 hours a day all year round, we are available when you need it!


Telephone

Denmark: +45 7025 3515

US: +1 213 631 4097 (local rate)

E-mail

info@supporters.dk

support@supporters.dk

Head office

Supporters A/S

Ledreborg Allé 118E

DK-4000 Roskilde

CVR-nr. DK32272592


Other locations

Havndal

Silkeborg





Security and compliance

Visit our Trust Center to read more.


Support

Create a support case

By clicking on "Create case" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Kåret til Danmarks Mest Anbefalede Virksomhed 2024

Contact

Contact us

We are in the office weekdays from 08:30-16:30. With the hotline open 24 hours a day all year round, we are available when you need it!


Telephone

Denmark: +45 7025 3515

US: +1 213 631 4097 (local rate)

E-mail

info@supporters.dk

support@supporters.dk

Head office

Supporters A/S

Ledreborg Allé 118E

DK-4000 Roskilde

CVR-nr. DK32272592


Other locations

Havndal

Silkeborg





Security and compliance

Visit our Trust Center to read more.


Support

Create a support case

By clicking on "Create case" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

How long does it take for a newly established server connected to the Internet to become infected?

Security specialist Henrik Kramshøj answered that question when he held a presentation on IT security at Supporters last week.

Security specialist Henrik Kramshøj answered that question when he held a presentation on IT security at Supporters last week.

Here are the most important conclusions we work towards in everyday life and which we would like to share:

• Focus on the basics: update, backup and prevention

• Assess why IT security is important to you and plan accordingly

• Have a plan ready for when things go wrong

• Divide security into several layers, so that more than one layer has to be breached to access your data

• Make sure you take dedicated ownership of IT security, it is an important role in the business

• Introduce fixed procedures for control so that misconfigurations are spotted

• Hacking is easier than most people think

Many thanks for an exciting presentation, Henrik. The answer to the question is already after 5 minutes.

You may be interested in this news.

Our blogs

Stay up to date with blogs, news and events.

Create focus on the business today

Let go of your worries with unlimited IT support at a fixed price per month

Get a call

Call or write to

Jan Grested

Get a call from Jan

By clicking on "Call me" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.