Information security in focus
Information security is a very important aspect of protecting personal data from undue intrusion, not least in view of the GDPR. We ensure the processes so that you are fully protected.
Security is more than technology - it's a way of working
At Kontek, information security is an integral part of our everyday work. Our dedicated security team works continuously with external experts to ensure a safe, robust and stable operating environment.
We prioritize both security and confidentiality in everything we do - to protect our customers, their data and our own business. With proactive procedures, checks and updates, we make sure you can always feel safe with our solutions.
Catching weaknesses before they become a problem
In our latest article, we tell you how we work to prevent vulnerabilities before they become a problem. Read about our strategic work, concrete examples and how we strengthen information security in practice.
Read the press release
How we work with security in practice
Knowledgeable, responsible and aware staff
All employees undergo regular training to gain insight into the latest threats and how to act according to best practices.
All Kontek employees have signed a non-disclosure agreement upon hiring and receive a personal briefing with Kontek's IT security function as a mandatory part of the onboarding process.
Kontek is certified according to ISO27001:2022.
Read more about our ISO certification
Network security
Our network infrastructure is designed with security in mind.
We use modern firewalls, intrusion detection systems, encryption and other tools (e.g. vulnerability scanners) to monitor and protect our own and our customers' assets.
The solutions use a multi-layered architecture for optimal protection of information assets.
Access management
Our access management policy ensures that only authorized users have access to specific systems and data.
We use multi-factor authentication to further strengthen the protection of user accounts.
For Kontek employees, their access rights/levels are based on their work function and role, following the approach that one should always be assigned the minimum possible user privileges to be able to perform their work according to defined responsibilities. Access rights are reviewed regularly.
Software and system updates
Incident management and response plans
Physical security
Vulnerability analysis and penetration testing
Regular backups
Supplier audits
We conduct regular audits of our suppliers' security performance to ensure that they maintain at least the same high security standards as we do.
Through all these measures and a constant ambition to improve, we strive to create a secure and reliable IT environment to meet the challenges of a changing world.
Jens Aspman, Information Security Officer
