How Indicators of Compromise (IoCs) contribute to increased cybersecurity
Safeonweb@work
Article
Published: 17/03/2025
Indicators of Compromise (IoCs) are essential artifacts that point to a potential or ongoing cyber incident. They are crucial for identifying and addressing cyber threats. How Indicators of Compromise (IoCs) contribute to increased
CCB’s Cyber Tips: How to mitigate security risks for Remote Desktop Protocol (RDP)
Safeonweb@work
Article
Published: 16/05/2024
Remote Desktop Protocol (RDP) is a protocol that allows users to access and control computers remotely. While it offers user-friendly flexibility, it also introduces significant security risks to your
Tech: DDoS Protection and Prevention - Technical Guideline 2024
Safeonweb@work
CCB
Article
Published: 16/02/2024
DDoS Protection and Prevention - Technical Guideline . A Denial of Service (DOS) attack is a cyber-attack that targets the normal traffic of a particular service. In a Distributed Denial of Service (DDoS) attack, a network website is overloaded
Ransomware guide for small to medium sized organizations
Safeonweb@work
Article
Published: 11/08/2023
In case of a ransomware attack, there are several steps that you can take to handle the incident efficiently. In this document we will give more information on how to respond to the incident and to help prevent this in the future. In
First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks
Safeonweb@work
Article
Published: 20/07/2023
Le risque de cyberattaques ne cesse d’augmenter. En moyenne, on compte cyberattaques par jour, soit une hausse de % par rapport à . Près de % de ces attaques échappent à toute poursuite. Les témoignages d’entreprises
Protect accounts with multi-factor authentication
Safeonweb@work
CCB
Article
Published: 25/07/2023
Your password doesn't protect you like you think. Especially if someone can guess your password by looking at your social media. But let's say you have a complex password - or even a password manager - even then,
How to respond to a ransomware attack in 12 steps
Safeonweb@work
CCB
Article
Published: 23/07/2023
Organisations should assume that sooner or later they will be confronted with a ransomware attack. The main question is when. Preparation is key. This is a guide about urgent actions to take when a ransomware has hit your company. How to
How to keep control of your mobile devices?
Safeonweb@work
CCB
Article -
Published: 22/07/2023
In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of
My Vulnerability Testing Toolbox
Safeonweb@work
CCB
Article
Published: 19/07/2023
If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions. This could
Reporting Cyber Risk to Boards
Safeonweb@work
CCB
Article
Published: 18/07/2023
Boards have a statutory duty to have proper risk oversight. Cyber risk constitutes by now a critical, potentially material, business risk. However, most Boards are ill-equipped to deal with cyber risks. They consider cyber as too