Cyberattacks and threats can cause grave disruptions. Sensitive data can be lost or stolen and industrial processes could be halted, ultimately causing stagnation of production with revenue loss. It could even cause customers and public to lose trust in a company which became a victim of a cyberattack, leading to reputation damage.
Industrial Automated Control Systems (IACS) from the Operational Technology (OT) domain are linked to either the enterprise IT networks or the internet.
Read moreSmart devices, gadgets and other data driven and connected products can impose cyber security risks if not properly designed, tested and assessed.
Read moreA key element of digital systems is data or information. Our information security related services range from audits and certifications to security checks and assessments.
Read moreRecently, Kiwa extended Heijmans' ISO 27001 certification, affirming Heijmans' efforts in information security. Raymond van Ommeren, quality coordinator at Heijmans, discusses the importance of this certification.
Read moreThe market is patiently waiting for the harmonized standards to be published. But it is good to know that the possible publication of the harmonized standards isn’t just sunshine and rainbows. There are important thing to consider when making use of harmonized standards.
Read moreAlthough 1 August 2025 still seems a long way off, it’s a relatively short period of time to get started on a project to achieve compliance of a product. Even if you are still unsure about the testing strategy or if you are not yet sufficiently familiar with the laws and regulations, the associated standards and requirements. The advice is and remains: get started now! The following tips will help you on your way.
Read more