The importance of Compliance, IT-Security and Data Protection


The importance of Compliance, IT-Security and Data Protection

… and how to get it implemented with your employees in the most effective way

Did you know that cybersecurity and compliance training is the no. 1 priority on the list of top world leaders today? Back in 2017, digitalisation was on everyone’s agenda, and in natural extension of the increased digitalisation, the need for cyber security and compliance training has emerged. For there is a greater risk of cyber-attacks than ever before and the economic consequences thereof can be devastating.

In fact, the statistics show that 98 % of all cyberattacks in companies are due to the unintentional actions of employees – which means they could have been prevented.

IT security systems and filters block what is possible, but hackers are constantly changing methods, so the most important defence is to ensure that your employees have the right knowledge and make the right reservations in their daily lives.

Our consultants have a lot of experience in GDPR compliance and cybersecurity training. They can help assemble a compliance training course to create the most effective training for your employees.

Free Demo

Getting started with Plesner GDPR compliance as e-learning is quick and easy. You will receive an email with instructions, and at the agreed time, all participants will automatically receive an email with the introduction and login to the Plesner GDPR.

Increase security today

Did you know that a secure password is one of the most important factors in protecting access to your devices, systems, websites and data. 80 % of all hacking-related incidents are related to weak or stolen passwords.

  • Choose a long password. The more characters in your password, the harder it is to guess or break – it’s that simple. Use e.g. phrases rather than single words and preferably use letters, numbers and characters combined.
  • Never use words in your password that can be easily guessed or looked up online. Passwords that include items such as your spouse’s birthday, your favorite band, or your pet’s name are information that is easy for cyber criminals to access.
  • Never share your password with anyone and never write down your password. That means no yellow notes on the screen or under the writing pad.
  • Don’t use the same password in different places. Lists of hacked user accounts and passwords are bought and sold on closed internet forums and then hackers test if the same password works elsewhere.
  • Use two-factor authentication whenever possible. Use an extra code for login e.g. generated by a key-app or text message service.

If you follow these advice, you, your employees and thus your company, are far better protected against data breaches.


98 % of all cyberattacks towards companies are totally or partly due to the unintentional actions of the employees of that company


Should I contact you?

Commercial Director

Jens Hindkjær


Should we get in touch?