Want to view security information for a specific product?
Get details on data centres, sub-processors that process personal data, and security certifications.
Visma has several core security programmes.
Need a refresher on the basics of cyber security?
Learn about what it is, why it's important, and the most common threats and vulnerabilities.
Schrems II verdict and Cloud Act
Have questions regarding Visma’s use of cloud vendors from the U.S. in light of the Schrems II verdict and Cloud Act, and what this means for your data?
Latest on security and privacy from our blog
Losing critical data can be devastating for a company. How can you make sure that your organisation’s data is secure, how should you set a solid backup strategy, and what are the advantages and disadvantages of storing your data on cloud servers versus on-premise servers?
Not all hackers are bad—in fact, ethical hackers can help companies strengthen their security measures. But how does bug bounty programs and responsible disclosure programs work, and what does the process of ethical hacking look like?
Every organisation—from startups to large, global corporations and nonprofits—must make sure that they have procedures to keep up with an ever-changing landscape of threats and vulnerabilities to keep its assets secure. But what is an IT Security Policy, and how do you enforce them?