Incident reporting with our app!

It is time to bring you great news again - now you can report incidents in our app as easy as 1-2-3!

1 - Select incident

2 - Give a short description

3 - Click submit

...and the app takes care of the rest; adds location & date and you can add photos with your device’s camera. On our web platform, you can search and filter across all incidents and get the total overview on the dashboard - Reach out for a demo...

Total Overview - Always Updated! 

incident reports dashboard.png

Cybersecurity of SaaS-Solutions

There is - for many good reasons - much talk about cybersecurity and if you are not an expert (which I am certainly not - but I have skilled people helping me with this) it can be difficult to navigate the jungle of technical terms and assess the vulnerabilities and level of risk in what is a multi-billion ($) industry.

In our company information security is something we take extremely serious since our product and only distribution channel is online, which is why protecting our customers' data is embedded in everything we do - the life of our company depends on it.

Without getting too deep into technical jargon the protection of data in Software as a Service is primarily centred around three entities and the connections between them; 1) the hosting environment, 2) the vendor's internal set-up and 3) the end-users’ IT-environment.

If your SaaS-vendor is using one of the top two or three hosting partners you are sure they adhere to the most rigorous security requirements on hosting but you should also explore if:

  • APIs and connections are encrypted (AES 256)

  • all databases are encrypted and decrypted in real time

  • how often backups are done

  • a redundant set-up/offsite replica (a secondary mirroring of the data, which can take over if the first goes down) is in place, which is not given unless your vendor specifically has chosen that solution (and pays for it)

  • the vendor’s own access to the production database is limited i.e. to on-premise IP-numbers to ensure that access to the most vulnerable point is restricted and that both the digital and physical access to computers are managed carefully.

One element that is out of the vendor’s control is the customer’s behaviour and systems. The UK Government provides us with good advice on 5 actionable cybersecurity controls provided by The National Cyber Security Centre.

Screen Shot 2018-03-05 at 20.46.48.png

The two-factor authentication mentioned in advice number 2 is an effective way to close a gap where the vulnerability of the user potentially can have big (read: extreme) impact. You probably know it from payment systems where you have to receive a code on your mobile device before being able to complete a transfer.

At Human Risks, we have implemented two-factor authentication free of charge for our customers to use so that we are as certain as we possibly can be that it is the right person with the right authorisation to log in to our platform. With two-factor authentication, we have reduced the risk of negligent password behaviour being exploited substantially and closed a potential vulnerability on our customers’ side.

Any important points about the vulnerabilities of SaaS and how to mitigate them I have left out? If so - don't hesitate to comment.

If you are interested you can download our IT Security White Paper here...

New Compliance App From Human Risks

A recurring control is the only way to ensure that things are as they should be. It can be a review of procedures, training courses, maintenance tasks, an inspection of security measures or a random spot check to make sure that IT-security procedures are being followed.

We have made it easy to manage all types of controls and document compliance with our new app!

Simulator Screen Shot - iPhone 8 Plus - 2018-01-10 at 10.54.05_iphone8spacegrey_portrait (1).png

Simply create a control, add a responsible, a start date and frequency and you are ready to go. The responsible person is notified in advance and the control can be completed using our new mobile app.

The app will be available in a few weeks and can be used as a stand-alone product or as an integrated part of our platform's risk management features.

Pricing is at a level where every organisation can afford to get in control.

Human Risks…Total Overview - Always Updated!

How To Create Value In Security Risk Management?


Mitigating measures that support the objective

Security risk management is ultimately about prioritising available resources. All the hoops security professionals go through to assess threats, vulnerabilities and risk levels are at the end of the day for them to be able to single out what threats should be countered by which measures in which order.

It is a very positive tendency that the security risk management community increasingly has been focusing on "enabling". An attempt to ensure that one's own effort is in line with the organisation's strategy and objectives and that you support and strengthen rather than limit. In other words, the security manager can go from being the "naysayer" to saying "yes we can do that - if..." and even add competitive edge through how security risks are managed; the footprint you leave, the international standards you comply with, the ability to integrate with your customers' organisations (how can we add value to our customers' customers?) or the information you are able to deliver - the possibilities to enable and strengthen the organisation are many. 

Involvement & collaboration!

Involvement & collaboration!


That is why two of my areas of focus has always been to:

1) involve relevant stakeholders (get inspiration on the "how" with the power-interest grid by Eden & Ackerman, 1998)  in security risk management, even though it takes time and you have to accept that you will not look as efficient to sr. management as you could - in the long run, you'll have a much greater impact. Remember that "effect = involvement x quality" and if you have to change how people work - involvement is key. 


2) prioritize implementing the mitigating measures you have evaluated as worthwhile during in the security risk assessments. It is a trap to get deeply fascinated by the colours of your heat maps and details of your risk register that you tend to forget what it's all about - implementing measures that impact the level of risk your colleagues (& customers?) are facing. It is the basic discipline in business "Project Management" that will change things "where the metal meets the meat" or in business language - where you meet your customers' needs. 

To keep it short; put effort into identifying and implementing the mitigating measures that support your organisation and prioritise the involvement of relevant stakeholders.

The author is the CEO & Founder of "Human Risks" - an online platform for security risk management where identification of mitigating measures, management and involvement is in focus. Read more on


Feature news from Human Risks!

We have been busy at Human Risks during the summer preparing a handful of new features that I'm quite excited to share with you - here's just a few...



Templates - Turn your mitigating measures into templates that can be distributed and managed across your organisation. Mitigations are automatically suggested to counter relevant threats in your risk assessments and you can manage implementation by assigning responsibility and setting deadlines. If you need inspiration on security measures you can download best practice security policies, procedures and guidelines from our growing library.


Audits - Add recurring controls to your mitigating measures that automatically generate audits and notify the responsible when it is time to complete them (e.g. the yearly evacuation drill, monthly perimeter inspection, maintenance tasks etc.). This feature gives you a visual overview of all audits, remarks & follow-ups and whether they are "on schedule" or have exceeded their deadline.


Incident Reports - We've done a re-design of our incident reports front page that allows you to pull statistics on global security incidents from our constantly updated data feed from the experienced analysts at Riskline and your organisation's internal incident reports

I'll follow up with individual posts on each feature and share some thoughts on why they are important when managing security risks...

Oh - and I nearly forgot the app - It'll allow you to complete audits on the go from a phone or tablet and will hit the app stores in a few months... I'll keep you posted!

When an organisation decides to implement a structured approach to managing risks this is what happens!

OK - the list is just some of the observations I have made and is of course not complete - but hey what don't you do for a catchy headline?

These are some of the positive (side) effects that I have seen come from implementing a structured approach to managing risks:

Awareness - The increase in awareness you can create internally in an organisation is the most important gain. People start discussing what makes a threat and how dangerous it really is (risk). How the organisation's objectives are tied to potential risks and how managing them can either allow them to reach their objectives or even gain competitive advantage by doing so. Awareness is still one of the most important factors if you want to manage risks because it all comes down to affecting human behaviour and when people gain an understanding of potential risks based on facts and feel they are heard and involved in a "bottom up"-approach they are much more likely to adapt their behaviour and embrace "corporate policies" because they are partly their own.


Resources - Mapping potential risks and discussing which to counter to which degree is basically a discussion about prioritising resources. The process gives organisations a clear picture of what is at stake both in terms of impact (people-assets-reputation) financially and in terms of business strategy, which allows them to make informed decisions on what risks to take and how to mitigate them. The decisions should be compared to the objectives of the business and either support reaching them or setting new ones.


Focus - When you are making an effort to know your current and emerging risks and how to handle them it gives a calm and overview that allows the organisation to focus on their key objectives - delivering the services and products to their customers, which to my best knowledge risk management is all about supporting! 

What are your experiences? Any points I have blatantly left out? (Read the comments on LinkedIn)

Need a Site Security Review App?


We are launching a site security review app in September and have available seats for co-funders who in return for feedback get a more tailored product and a very reasonable price.

The app allows you to define minimum security requirements and the user can then create a review and map a site's level of compliance.

The co-funder offer is open until 1st July and ensures you product development meetings before and after the launch.

Sign-up here for more information on the specifications and price or share with your network

Threat identification based on facts

Our integrated database of global security alerts country risk summaries and risk levels helps you identify and assess relevant threats for your risk assessments on the Human Risks platform.

We believe that threat identification and assessment should be based on facts.

As an example - there are 83 conflict & terrorism related incidents with a risk level rated "medium" & "high" in Kenya from 2015 to today. All incidents rated "high" happened within the past 3 months.

Contact us for a free demo here:

Sign up for a free demonstration!

Security risk management in spreadsheets? Not anymore! New times require new tools.

Human Risks' online security risk management platform enables your organization to identify and assess threats, manage the implementation of mitigating actions and setting up recurring audits that automatically notifies the responsible.

Our feed of global security incidents ensures that threat identification and assessment is done on facts and will keep you updated only on selected incident types matching your assessments.

As we like to say: Total Overview - Always Updated!

Sign up here for a free demo:

ASIS Europe - Security Risk Management Conference

Human Risks were present at the ASIS 2017 Europe Conference, where we had a stand, talked about the future of risks management and served a local Danish brew of schnapps. Visitors could also win a 6 month subscription to our platform including 2 online training sessions!

The ASIS Europe 2017 was a fantastic experience! We are now following up on the 30+ security professionals from all around the world - from Pakistan to Venezuela - who were interested in a presentation and a free trial to Human Risks.

Our intern Yuki made this great video that sums up our trip to Milan! Check it out below:

Follow our blog and LinkedIn-page for more updates on the future of risk management!