Cybersecurity lexicon
Secure your business in 4 easy steps
Methodology
Research report
- design and implementation of your cybersecurity infrastructure (see below).
- follow-up and incident management (see below) tests and training (see below).
- Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.
- Make a list of the critical operations and vital business resources that need protecting: Which systems, networks, ICT devices, ICT applications and data are essential for your business? Make an inventory of all offices, devices and data that need to be secured. Analyze what your employees need access to and what not. Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.
- Decide what you want to do in-house and what you want to outsource. Do you have sufficient knowhow and manpower to monitor everything yourself?
Things to think about here:
Analyze your cybersecurity strategy
- Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.
- Set up an action plan for the implementation of new infrastructure.
- Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.
Design and set up your cybersecurity
- Set up procedures to monitor cybersecurity warnings 24/7.
- Make sure that someone regularly checks the status and logs of your cybersecurity solutions.
- Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?
Follow up and make an incident plan
- Organize a test-case to try out your incident plan.
- Train employees to be smart and secure when using the devices and data of your business.
- Enjoy peace of mind thanks to 360° protection and expand your business.
Test, train and achieve success
- design and implementation of your cybersecurity infrastructure (see below).
- follow-up and incident management (see below) tests and training (see below).
- Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.
- Make a list of the critical operations and vital business resources that need protecting: Which systems, networks, ICT devices, ICT applications and data are essential for your business? Make an inventory of all offices, devices and data that need to be secured. Analyze what your employees need access to and what not. Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.
- Decide what you want to do in-house and what you want to outsource. Do you have sufficient knowhow and manpower to monitor everything yourself?
Things to think about here:
Analyze your cybersecurity strategy
- Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.
- Set up an action plan for the implementation of new infrastructure.
- Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.
Design and set up your cybersecurity
- Set up procedures to monitor cybersecurity warnings 24/7.
- Make sure that someone regularly checks the status and logs of your cybersecurity solutions.
- Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?
Follow up and make an incident plan
- Organize a test-case to try out your incident plan.
- Train employees to be smart and secure when using the devices and data of your business.
- Enjoy peace of mind thanks to 360° protection and expand your business.