Frequently asked questions

Navigate to:

FAQ - General

We are eager to provide Managed Services, upgrade IT architecture & improve cybersecurity for businesses in Europe. Cyber risk for businesses is increasing. We take action to secure your business against cybercriminals.  Read more
A solid team of IT experts that is worried about the cybersecurity in companies. By combining multiple fields of expertise, we are able to provide high-level security and managed services for businesses in Europe. Discover our team
Transparency is extremely important for us. We monitor a lot of sensitive and valuable information. It goes without saying that we want to share everything we do with you. That’s why we provide transparent reports monthly. These reports include information about all your IT components.
The costs are always adjusted to your needs. This means that you pay what you use. Because the costs are adjusted to what you use, your money will never be wasted. Wondering how much a solution will cost for your problem? Contact us today
Yes, We have built up long-term relationships with our partners. They are all companies that deliver outstanding products or services. By working closely with them, we are able to provide high-level IT-solutions for our customers. Check out our partners
Safe-Connect is a division of Cats&Dogs. You can find us here: Corda Campus – Corda A Kempische Steenweg 303 bus 4 3500 Hasselt
We are happy to help you from Monday to Friday: 09:00 AM–6:00 PM. For general questions, you can call: +32 11 946 310. If you are in need of IT support, you can call: +32 11 946 320. Our email address is the following: support@catsanddogs.com You can find our contact form here.
Yes, we are currently looking for an Azure Security Expert. You can check out the full job posting here .
You read it right, telephony is possible in Microsoft Teams. You can do that with direct routing or via a subscription in the Cloud. We wrote a blog about how you can fully integrate this in your company. If you’re having problems with that, we’d be happy to help you out. You can always contact us!
Integrating telephony has many advantages. You save a lot of time and costs because everything is centralized. In addition, it is extremely user-friendly and it is possible to make calls with Teams from any device.
The FIRST LEGO League is a robot competition for young people aged 11 to 14. Like several other companies, Cats&Dogs is a sponsor of this competition. We wrote a blog about the first time a Belgian team won the cup.

FAQ - managed services

Managed Services is a popular term in the current business world. It’s when a company outsources their information technology management and maintenance to an external provider. This way, a company can focus on their core business. The IT responsibility will be transfered to the external partner. This means that they can expect their IT infrastructure to be safe. Learn more
Managed services have many advantages. By transferring the responsibility to an external provider, you are sure that your IT infrastructure is safe. Read more about the advantages of Managed Services
With the help of our expertise, our Managed Services have a proactive approach. By providing layers of security, cyber attacks will be prevented. Financial loss will be prevented this way. This means that the Total Cost of Ownership (TCO) decreases while reliability increases. Learn more
We always make sure to implement high-level security tools. These tools can be monitored and adjusted to your needs. By doing this, we can constantly take action whenever needed. This proactive way helps us to ensure the continuity of your business. Learn more
A Managed Service Provider (MSP) guarantees an excellent level of security. The security of your company and its data is assured. Furthermore, you enjoy a low total cost of ownership, high productivity and full continuity.

FAQ - Cybersecurity

Cybersecurity has always been important for both customers and business. A business can’t operate properly without an IT infrastructure. Hackers are getting smarter. This means that businesses have to take their cybersecurity to the next level to prevent cyber attacks. Read more
Cybersecurity is not easy to manage and monitor. As a managed service provider, we can help you to monitor and add layers of cybersecurity to your business. If you are not sure about your company’s cybersecurity level, you can request an audit. Read more about a free audit.
There are many things you can do to improve cybersecurity. There are some simple but effective actions you can take. You can enable Multi-factor Authentication or you can train your users in digital hygiene for example. You can find a list of our cybersecurity tips here.
Multifactor authentication (MFA) is a way to validate a user’s authenticity in multiple ways. This can be done through a variety of factors. Popular examples of MFA are: facial recognition, fingerprint and voice recognition. You can read more about MFA in this blog.
At Safe-Connect, we always look for the software that can provide the best solutions. At Microsoft, we see strong security and great flexibility. Two factors that are essential for companies. You can read more about Microsoft here
Defender was formerly better known as Advanced Threat Protection (ATP). It is a cloud-based security portal. With the help of Defender, you can stop cyber attacks and take action. The dashboard makes it easier to identify risks. You can find more info about Defender here
Azure Information Protection is a security solution from Microsoft. It is used to securely share emails, documents and sensitive information with users outside an organization. Sounds interesting? You can read more about it here
Conditional access is a part of Microsoft security. With this security you create policy rules. These rules ensure that you determine exactly who and how people can log in to get access to sensitive information. You can read more about it here
Intune is part of the security solution offered by Microsoft. With Intune you configure policies to manage applications on mobile devices such as: laptops, cell phones and tablets. Read more about Intune
It often depends on what exactly your business needs. Feel free to contact us, we can look for the right solution together. At Safe-Connect we searched for a solution to combine productivity and good security. Read the full story here
We were looking for a Microsoft plan where productivity and strong security could be combined without paying a large amount of money. Upon using this package, we quickly found out that this is a great solution for businesses. Read the full story here
Unfortunately, a password is no longer sufficient to protect yourself digitally. Fortunately, there are several ways to protect yourself. In this blog, you will read how to use MFA.
Microsoft Secure Score is a useful tool that helps you to monitor the security within your company. Based on a score, you can see what could be better within your infrastructure. The dashboard also gives recommendations that you can follow to strengthen your security. In this blog you can read more about it
Phishing is a popular form of Internet fraud. It is popular among criminals because it is easy to execute. Hackers impersonate legitimate organizations through misleading emails, websites and text messages. If you then click on the link and enter your credentials, they will have your login information and other sensitive information. It is important to be well aware of Phishing and be able to identify suspicious emails and messages.
You cannot prevent Phishing messages or emails. You will undoubtedly receive them. That doesn’t mean you can’t do anything against them. If you don’t respond to such messages or emails, nothing will happen at all and they won’t be able to steal your data. So it’s important that you can recognize suspicious messages. Isn’t that logo just a little different? Does the sender have a strange email address? Even sentence structure and spelling can indicate a suspicious email. Try to ask these questions every time you see a suspicious email. If you think it looks fishy, it’s best to ignore the message.
There are many ways to do that nowadays. In fact, it is much safer to log into your device or account without a password. Think about facial recognition and fingerprint scan. You can read more about it in this blog
The most common login methods are facial recognition and fingerprint scan. Windows Hello is a great example of facial recognition. It is incredibly secure and also convenient. You can read more about it here
Fortinet is one of our trusted partners. They specialize in intelligent firewalls. As such, they are an important part of our security solution. Discover all our partners here
A firewall is a system that can protect a network or computer. You are probably connected to the Internet if you are reading this. A firewall protects an internal network from the Internet. It does this by, for example, blocking potentially harmful traffic or data transfers.
Fortinet is an organization that specializes in high-end firewalls. Fortinet’s firewalls are intelligent. That means they can communicate with other devices and even run in the Cloud. Combine this with high-tech security and you get the basics of a Fortinet firewall.
Because hackers are getting smarter. The Danish transport company Maersk fell victim to the Petya virus. This caused major financial damage. Later it turned out that the biggest cause of the incident was the lack of security policies. It is important for companies to implement security on all levels. You can read more about it here.
Digital hygiene is a term used to describe behavior online. Good digital hygiene indicates that you are aware of the dangers online and therefore also deal with data in a ‘clean’ way. We wrote a blog about it.
Digital hygiene is important for both businesses and regular Internet users. You ensure that the chances of your data being stolen are reduced. This is an important factor for companies. Employees have access to a company’s sensitive information. Training in digital hygiene is always welcome. You can read more about it in our blog
The Hafnium hack is the infamous attack that has been carried out on Microsoft Exchange servers. Hafnium is a group of hackers from China. The hackers found vulnerabilities in the system and exploited them. The attack was global and was a shock to the IT world. You can read more about it in our blog about the Hafnium hack.
With the Microsoft Secure Score you can strengthen your cybersecurity. You get an overview in which you can monitor everything. It also gives you recommendations and actions you can take. It is even possible to test your IT infrastructure or your employees with an attack simulator. You can read more about this tool in our blog. Not sure how to use this tool to its full potential? We’d love to help you out. Feel free to contact us today!

FAQ - IT infrastructure

An IT infrastructure is the connection of all the IT components of the entire company. It is necessary to build a secure and flexible infrastructure. How do you realize that? By using the right platform and tuning and building it correctly. You can read more about it here
Many business processes are accelerating through digitization. To accelerate digitally as a business, you need a strong IT infrastructure. This one should be secure and flexible. Not sure where to start? We are happy to help you further. Feel free to contact us for a conversation.
We see a lot of possibilities with the Microsoft Azure platform in terms of cybersecurity and flexibility. If your software needs extra performance during a peak load or just less performance during the weekend, Azure makes that possible cost-effectively and without investment. Read more about it here
You can only do that with an IT architecture plan. With that plan you will determine the current state and the desired state. With our experience, we are happy to help you with that. Feel free to contact us today
With the help of an audit, we can outline your current IT infrastructure. Our knowledge of business processes and technology allows us to identify your company’s weaknesses and strengths. With this information, we go further and help your business accelerate digitally. Read more about an audit
Yes, you can request a free audit at any time. Together we will look at the various IT components within your company. Then, we will look for solutions. Contact us for a free audit, we will gladly help you further
We can offer you a free audit. With this audit we can determine if your IT infrastructure needs adjustments or upgrades. Further cooperation will follow after an agreement has been made. Read more about the free audit here
The answer is usually yes. All we need to look at is how to do it as efficiently as possible. Using our expertise and the cloud services of Microsoft Azure, we are able to help you. Not sure how to do that? Feel free to contact us and we’ll discuss it together.
Cybercrime will always be present. In any case, switching to the Cloud is a good choice because it brings with it a lot of security. In the Cloud, you enjoy many security features such as file encryption and conditional access. The possibilities of the Cloud are actually endless. On our website you can find more information about how the Cloud can help you. If you have questions or if you want more information, you can always contact us!