The importance of Cybersecurity

The digital age. An era in which we think about acceleration and improvement. Unfortunately, we are also forced to keep ourselves well-secured. Hackers and cybercriminals are getting smarter and have access to many tools. Cybersecurity becomes vital.

Cyber attack

Companies are often the target. They have a lot of data and a lot of damage can be caused. In 2017, the Danish transport company Maersk was the victim of a cyber attack. The Petya virus was the cause and is a form of malware. Major damage as a result. No less than 4000 servers and 45000 computers had to be reconfigured. As recently as this year, Microsoft Exchange servers were also affected by Hafnium. A notorious cyber espionage group. With a zero-day exploit, they hit thousands of servers around the world connected to Microsoft Exchange. Another commonly used attack is what we call “Phishing”. It is popular among criminals because it is easy to perform. By impersonating legitimate organizations via deceptive emails, websites and text messages, they can steal sensitive information. Emails, text messages and websites that look suspicious, should always be looked out for. 

I have been attacked, what are the consequences?

Financial loss, blackmailing due to trade secrets being stolen and data that is no longer secure are only a few examples.  That’s not to mention a possible downgrade in reputation or the extra time and expense you have to invest to get everything back up and running.

How can I prevent this from happening?

Going from poor or moderate security to excellent security as quickly as possible. Wondering how to proceed? Our 15 tips are guaranteed to help you get started!  
  • Use dedicated seperate admin accounts

    Administrator rights must be managed!

  • Protect your e-mail from phishing, malware and suspicious links

    Use Microsoft Advanced Threat Protection / Microsoft Defender or similar tools.

  • Use the Microsoft Secure Score or a similar tool

    You get to know what your areas of improvement are and what actions you can take.

  • Train your users in digital hygiene

    Offering your employees an e-learning & Training Awareness Program is key for your organization.

  • Be sure to use a compliance manager

    Bridging the gap between technology and regulatory requirements such as GDPR and ISO 27001.

  • Monitor and analyze the logs of the systems

    This is an ongoing process.

  • Run a penetration test

    Immediate results allow you to take action accordingly.

  • Anywhere you can set up MFA, do so!

    Passwords are not sufficient as protection!

  • Use Hello, Face ID or fingerprint depending on your device

    This is usually more secure and easier than a password.

  • Use the security tools you already have to the maximum level

    Tools such as Bitlocker, Spam and Virus Filtering, Keypass or Bitwarden are accessible and easy to use.

  • Protect endpoints such as laptops, smartphones, tablets

    Endpoints serve as access points to a corporate network and can be exploited by malicious parties.

  • Protect your data

    Automatic data backup processes and encrypt whenever possible.

  • Protect your network infrastructure and data transit

    Use Intelligent Firewalls.

  • Manage software and hardware

    Even unused software should always be updated.

Our final tip: call in professional help

Professional Managed Services can guarantee an excellent level of protection. This way, you are always ensured safety in your business. Additional productivity and reallocation of licenses even reduce the total cost of ownership. 

Managed Cloud Services Safe-Connect

Excellent security on every level of your business.