This publication uses cookies

We use functional and analytical cookies to improve our website. In addition, third parties place tracking cookies to display personalised advertisements on social media. By clicking accept you consent to the placement of these cookies.
00-bg-gradient.png (copy)
00-ic-mousescroll.png (copy)
00-mo-pxs.png

Secure your business in 4 easy steps

Discover the Proximus 360°approach to making your organization secure. Pick and choose what you want: from total outsourcing to specific cybersecurity services.

Get some assistance from cybersecurity specialists

00-bg-gradient.png (copy)

Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.

Make a list of the critical operations and vital business resources that need protecting:
Which systems, networks, ICT devices, ICT applications and data are essential for your business?
make an inventory of all offices, devices and data that need to be secured.

Analyze what your employees need access to and what not.

Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.

Decide what you want to do in-house and what you want to outsource.
Do you have sufficient knowhow and manpower to monitor everything yourself? Things to think about here:
- design and implementation of your cybersecurity infrastructure (see below).
- follow-up and incident management (see below) tests and training (see below).

01-number.png
00-ic-mousescroll.png (copy1)
Analyze your cybersecurity strategy
00-bg-gradient.png (copy)
02-number.png

Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.

Set up an action plan for the implementation of new infrastructure.

Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.

Design and set up your cybersecurity
02-number.png (copy)

Set up procedures to monitor cybersecurity warnings 24/7.

Make sure that someone regularly checks the status and logs of your cybersecurity solutions.

Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?

Follow up and make an incident plan  
00-ic-mousescroll.png (copy1)
00-bg-gradient.png (copy)
  • Organize a test-case to try out your incident plan.

  • Train employees to be smart and secure when using the devices and data of your business.

  • Enjoy peace of mind thanks to 360° protection and expand your business.
04. Test, leid op en boek succes
04-number.png
Test, train and achieve success

Go to www.proximus.be/security or contact one of our cybersecurity experts.

For more information:

00-bg-gradient.png (copy)

Secure your business in 4 easy steps

Get some assistance from cybersecurity specialists

Discover the Proximus 360°approach to making your organization secure. Pick and choose what you want: from total outsourcing to specific cybersecurity services.

00-lo-color.png (copy1)
00-bg-gradient.png (copy)
01-number.png
Analyze your cybersecurity strategy

Decide what your crown jewels are. Decide what is critical and what is less critical: Weigh up the cybersecurity cost of each component against the possible impact of an attack.

Make a list of the critical operations and vital business resources that need protecting:
Which systems, networks, ICT devices, ICT applications and data are essential for your business?
make an inventory of all offices, devices and data that need to be secured.

Analyze what your employees need access to and what not.

Think about physical security as well: for example, make sure that visitors cannot just randomly enter your server room.

Decide what you want to do in-house and what you want to outsource.
Do you have sufficient knowhow and manpower to monitor everything yourself? Things to think about here:
- design and implementation of your cybersecurity infrastructure (see below).
- follow-up and incident management (see below) tests and training (see below).

00-bg-gradient.png (copy)
02-number.png
Design en zet uw
beveiliging op

Design your total 360° cybersecurity infrastructure yourself or with a partner. For example, outline how best to split up your internal network. Between which networks will you install extra firewalls? Who has access to what? Etc. And don’t forget a system for e-mail security, even if you have Office 365. Multi-factor authentication and a good back-up strategy are also a must.

Set up an action plan for the implementation of new infrastructure.

Document all settings, serial numbers, soft- and hardware versions, locations in the building, cables, etc.

02-number.png (copy)
Follow up and make an incident plan  

Set up procedures to monitor cybersecurity warnings 24/7.

Make sure that someone regularly checks the status and logs of your cybersecurity solutions.

Avoid panic. Decide beforehand what you will do in the event of an incident. Who should respond, how quickly, with what means? Who do you inform? Who has final responsibility?

00-bg-gradient.png (copy)
04-number.png
Test, train and achieve success
  • Organize a test-case to try out your incident plan.

  • Train employees to be smart and secure when using the devices and data of your business.

  • Enjoy peace of mind thanks to 360° protection and expand your business.

Go to www.proximus.be/security or contact one of our cybersecurity experts.

For more information: