This article was written for PreventFocus, a monthly magazine for health, safety and environment professionals. More information can be found here: https://prevent.be/product/preventfocus. We live in a connected world where IT plays a role in nearly everything we do today. At the same time, the huge growth of cybersecurity incidents, including the ones that happen by accident are showing us how dependent and vulnerable we have become when something goes wrong with IT.… Read More »Operating robust Operational Technology in a connected world
Ransomware attacks are everywhere these days, it’s the number one cyber threat that organizations face and a major risk for their business, and this isn’t going to change any time soon. While helping companies to prepare for and recover from these ransomware attacks, we are seeing an evolution in extortion techniques that could change the odds in favor of the criminals. Encrypting your files is still the initial tactic. Attackers… Read More »Ransomware in 2022 is taking extortion to the next level
We are excited to speak together with Paul Davies – CISO at Harrods this Thursday November 12 at Winmark’s CEO and Non-Executive Director’s network webinar about the Board’s involvement in cyber security.
Defining your Target Operating Model for partnering up with a Managed Security Services Provider (MSSP)
For many organizations, it’s no longer viable nor desired to deliver and manage all aspects of IT entirely in house, especially services that require advanced skills and are expensive to operate are hard to keep inhouse. Operating a 24/7 Security Operations Center (SOC) for cyber incident detection and response is such a service but how do you successfully partner up with a Managed Security Services Provider (MSSP)? Your Target Operating… Read More »Defining your Target Operating Model for partnering up with a Managed Security Services Provider (MSSP)
Password theft is a very common problem on the Internet and nearly everybody either knowingly or unknowingly becomes a victim of it. So, how do you check this and how do you protect yourself against it now and in the future? When people with bad intentions get hold of your password, they can take over your account associated to that password and start abusing the service behind it, for instance… Read More »Is your password also mine?
With COVID19 now reaching nearly every spot on the planet, lots of us are forced to work from home as much as possible. Whilst before this pandemic, teleworking wasn’t possible for everyone for various reasons, it now has become the standard way of working for many. This sudden change is not stress-free since besides the technology aspect, teleworkers also have to adapt how they collaborate from remote with their colleagues,… Read More »Stay Cyber-Safe while working remote
With the Corona-crisis now officially characterized as a pandemic, organizations are activating their business continuity plans – or are scrambling to change their way of working – to cope with the crisis and keep functioning. People with less good intentions might grab the opportunity to make some money abusing your changed operating model and the emotions that your teams have during a time of crisis. Criminals are already abusing the… Read More »Cyber vigilance during a crisis
When you open your newspaper, chances are pretty high that there is yet again an item or even a headline on cyber-attacks. Especially ransomware cyber-attacks are omni-present these days. These attacks lock people’s computers and their data where after users are asked to pay a ransom in order to get their files and systems back. Recent examples are Asco, a Belgian company in the aerospace industry with 1.500 employees in… Read More »Ransomware explained
The Board just approved your Cyber Security get-well plan, now what? How to buy the right security solution at the right price
YES! You step out of the board meeting with a smile. Since becoming responsible for Cyber Security 3 months ago, you first started to assess what the organization had already in place and what was missing to face today’s cyber threats and meet regulatory requirements. The outcome showed that – while doing good at some aspects – the organization serious lacked in some domains of information security. Today, the Board agreed… Read More »The Board just approved your Cyber Security get-well plan, now what? How to buy the right security solution at the right price