This publication uses cookies

We use functional and analytical cookies to improve our website. In addition, third parties place tracking cookies to display personalised advertisements on social media. By clicking accept you consent to the placement of these cookies.

FOR MORE INFORMATION:

Follow up and make an incident plan  

  • Set up procedures to monitor cybersecurity warnings 24/7.

  • Make sure that someone regularly checks the status and logs of your cybersecurity solutions.

  • Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?

Test, train and achieve success

  • Organize a test-case to try out your incident plan.

  • Train employees to be smart and secure when using the devices and data of your business.

  • Enjoy peace of mind thanks to 360° protection and expand your business.

Analyze your cybersecurity strategy

  • Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.

  • Make a list of the critical operations and vital business resources that need protecting: Which systems, networks, ICT devices, ICT applications and data are essential for your business? Make an inventory of all offices, devices and data that need to be secured. Analyze what your employees need access to and what not. Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.

  • Decide what you want to do in-house and what you want to outsource. Do you have sufficient knowhow and manpower to monitor everything yourself? Things to think about here:
    • design and implementation of your cybersecurity infrastructure (see below).
    • follow-up and incident management (see below) tests and training (see below).

Design and set up your cybersecurity

  • Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.

  • Set up an action plan for the implementation of new infrastructure.

  • Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.
  • Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.

  • Set up an action plan for the implementation of new infrastructure.

  • Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.

Secure your business in 4 easy steps

Analyze your cybersecurity strategy

  • Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.

  • Make a list of the critical operations and vital business resources that need protecting: Which systems, networks, ICT devices, ICT applications and data are essential for your business? Make an inventory of all offices, devices and data that need to be secured. Analyze what your employees need access to and what not. Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.

  • Decide what you want to do in-house and what you want to outsource. Do you have sufficient knowhow and manpower to monitor everything yourself? Things to think about here:
    • design and implementation of your cybersecurity infrastructure (see below).
    • follow-up and incident management (see below) tests and training (see below).

Design and set up your cybersecurity

Follow up and make an incident plan  

  • Set up procedures to monitor cybersecurity warnings 24/7.

  • Make sure that someone regularly checks the status and logs of your cybersecurity solutions.

  • Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?

Test, train and achieve success

  • Organize a test-case to try out your incident plan.

  • Train employees to be smart and secure when using the devices and data of your business.

  • Enjoy peace of mind thanks to 360° protection and expand your business.

FOR MORE INFORMATION: