Skip to main content

Article Directory

Welcome to the TRECCERT article directory, where we feature news and insights on information security, data protection, business continuity, risk management and more. The information provided is based on research and acts as a valuable platform for ICT professionals to keep up with current developments, trends and more. To stay up to date and informed, check out the latest articles below.  

GDPR Myths

GDPR Myths

Created by Lirim Bllaca |

The General Data Protection Regulation (GDPR) is a regulation on protecting personal data of EU citizens within and outside the European Union (EU) and European Economic Area (EEA). The regulation covers all aspects of data protection including data processing activities, rights of data subjects, obligations of controllers and processors, security measures, conditions for consent, breach…

Read more
GDPR on Cloud Service Providers

The Application and Impact of GDPR on Cloud Service Providers

Created by Donika Mucolli Pacolli |

A Cloud Service Provider is defined as an organization that offers infrastructure, network services and business applications in the cloud. Organizations and individuals that use cloud services can easily share information and data in the cloud for business and personal purposes. Information and data in the cloud is stored on physical or virtual servers, which reside in the facilities of a cloud…

Read more
Risk Management

The Role of Risk Management and Business Impact Analysis in Business Continuity Management

Created by Alisa Jashari |

Business continuity is defined by the International Standardization Organization (ISO) as the “capability of the organization to continue the delivery of products or services at acceptable predefined levels following a disruptive incident”. Business Continuity Management is the process of creating and maintaining systems that prevent and recover from potential threats risking the vitality of the…

Read more
Cybersecurity Awareness

5 Ways To Increase Cybersecurity Awareness in Your Organization

Created by Marigona Krasniqi |

Technology advancements have transformed organizations by making their business operations more streamlined and ensuring business efficiency. The growth of technology has created a wide range of opportunities for organizations, but also introduced them to new risks and vulnerabilities. Every vulnerability has the potential to be exploited by a cyber attacker through a software, command or code.

Read more
Team for a Management System Audit

Building the Right Team for a Management System Audit

Created by Urim Shuku |

The International Organization for Standardization (ISO) defines management system as “a set of interrelated elements of an organization to establish policies and objectives, and processes to achieve its objectives”. Organizations conduct management system audits for various reasons, but mainly to ensure conformance to one or more management system standards, and compliance to applicable…

Read more