Blog & Commentary
Highlights
ISO 27001
All your questions about ISO 27001 have been answered
SOC 2
SOC 2 for TPRM
Many people said that SOC 2 audit is every extensive. So, can I rely only on SOC 2 report when assessing of a potential new vendor?
ISO 27001
ISO for TPRM
Are all ISO 27001 certificates the same? Do they bring the same value no matter from which certification company they came from?
Blog Articles
Digital Trust: Indonesian Embassy Staff in The Netherlands Receive Fun and Informative Cybersecurity Awareness Training
On Friday, March 17, 2023, the Indonesian Embassy in The Netherlands received cybersecurity awareness training from FeHa International Consulting. The training, aimed at improving the embassy's staff's knowledge of basic cybersecurity practices and enhancing digital...
The Year of Growth and Learning
2022 is about to end. But I won’t let it pass without a self-reflection on how FHIC performed throughout the year and plan to progress in the coming year of 2023. Looking Back Overall, 2022 is a fantastic year for FHIC. In summer we officially opened a new company in...
ISO 27001: All Your Questions Answered!
We hear you loud and clear! In this post, we will try to answer all questions related to the ISO 27001 that often come to us from prospective and current clients. If you prefer to read it on some other time, you can download the page in PDF by clicking this link here....
Commentary
The basic security measures work: Lesson learned from Linus Tech Tips YouTube Channel Hack
As someone interested in staying abreast of cybersecurity incidents, I was intrigued by a video featuring a YouTuber who fell victim to session hijacking. Despite the unfortunate situation, the video offered transparency and a touch of humor while educating viewers on...
Security Questionnaire is Not The Ultimate Goal of Third Party Risk Management Program
Managing third-party risks has become a critical aspect of cybersecurity for businesses of all sizes. As companies increasingly rely on external vendors and partners to support their operations, the potential for data breaches and other security incidents grows. In an...
Cybersecurity rating service is here to stay
Working on third-party security risk assessment or due-diligence means that you are eventually use one of the so many cybersecurity rating services to expand the coverage of your review. You may thought in the beginning when designing the program "We cannot just rely...
FeHa International Consulting
Evert van de Beekstraat 354
1118 CZ, Amsterdam
The Netherlands
contact@feha.io
Services
Security Compliance
Third Party Risk Management
On-demand Officer
Company
About Us
Customers & Partners
Blog & Commentary
Privacy Policy