Ónauðsynleg gögn –  Myndband

Vinnsla persónuupplýsinga er varða kynþátt eða þjóðernislegan uppruna, stjórnmálaskoðanir,
trúarbrögð eða heimspekilega sannfæringu eða þátttöku í stéttarfélagi og að vinna erfðafræðilegar upplýsingar, lífkennaupplýsingar í því skyni að persónugreina einstakling með einkvæmum hætti, heilsufarsupplýsingar eða upplýsingar er varða kynlíf einstaklings eða kynhneigð er bönnuð nema að uppfylltum ströngum skilyrðum sem eru nánar útskýrð í 9. gr. persónuverndarlaga.

Viltu sjá fleiri myndbönd?

Viltu sjá öll myndböndin okkar?  Skrifaðu nafn og netfang og við höfum samband.

[wpforms id=”643″]

How to get started

You and your employees are going to love AwareGO. It’s a modern, cloud-based system for managing human risk, from assessment to remediation. We’ve made it super easy — schedule your first assessment or training in minutes.

Get started for free and give it a go right now.

You’ll love the way AwareGO can fit into your existing infrastructure. Our robust APIs, widgets, and content available in SCORM format make sure that the integration is seamless. We also integrate with Active Directory, Google Workspace, and popular tools like Slack and Teams.

Contact us and our experts will recommend the best way to integrate.

Upgrade your cybersecurity business by adding human risk management to your existing portfolio of services. Increase your deal size by leveraging Human Risk Assessment or offering Security Awareness Training to your current customers and creating a new revenue stream.

Contact us to become an AwareGO partner, and we will support you every step of the way.

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free
blank blank blank blank blank blank blank blank blank blank

Stay on top of cybersecurity threats

blank
The Human Element: A Crucial Aspect of Cyber Risk Assessment Services and 8 Ways to Address It

Cyber threats continue to grow in sophistication and frequency, making it crucial for businesses to take proactive measures to protect their sensitive...

blank
How Human-Centric Security Design is Transforming Traditional Cybersecurity Approaches

While technology continues to evolve at a rapid pace, one factor remains a constant in the cybersecurity landscape: the human element. According to va...

blank
The Importance of Multi Factor Authentication in Improving Business Security

As digital transformation continues to shape the business world, the need for robust cybersecurity measures has never been greater. One of the most cr...

blank
AwareGO is SOC2 compliant

AwareGO’s SOC2 Type 1 Compliance proves we have the governance, systems, and infrastructure in place to protect client information from unauthorized a...

blank
Demystifying the Myths about Cloud Security: What You Need to Know

Cloud computing has revolutionized the way businesses operate, offering them cost efficiency, scalability, and unprecedented flexibility. Yet, despite...

blank
Remote Working Cybersecurity: 9 Ways to Stay Safe Outside of the Office

Over the past few years, remote working has become a norm rather than the exception. While this flexible working style offers numerous benefits, it ha...

blank
AI Security Risks: Understanding the Hidden Dangers of Using Artificial Intelligence for Work

In today’s rapidly evolving digital landscape, artificial intelligence (AI) has emerged as a significant game-changer, affecting almost every industry...

blank
Locking the Digital Doors: Implementing Access Controls to Prevent Cybersecurity Tailgating

The digital landscape is a sprawling, interconnected network teeming with opportunities for businesses and individuals alike. However, it also present...

blank
How to Choose the Best Security Awareness Training Program for Your Team

Cybersecurity threats continue to pose a significant risk to organizations of all sizes, making security awareness training and human risk management...

blank
The Cost of Tailgating: Understanding the Financial Impact of Physical Security Breaches

Tailgating, also known as piggybacking, is a physical security breach that occurs when an unauthorized person follows an authorized individual into a...