Blog

Quick updates

The holiday season often brings the joy of unwrapping new gadgets, and one exciting addition could be a shiny new smartphone. However, before you bid farewell to your trusted old device, it's crucial to ensure a smooth transition, especially regarding your Multi-Factor Authentication (MFA) profiles. Read more

We start with the conclusion of this article because we cannot emphasize it enough. But, of course, we want you to stay interested and keep on reading. That is why we already reveal that we will provide you with a clear and comprehensible overview of the different forms of social engineering. We will also explain how you can minimize the risks for your company as much as possible. Read more

Digitisation is a broad concept for an SME, but a number of components always matter. With Christophe Kourtis, business partner lead manager at Proximus, we go over the main building blocks for digitisation for SMEs. And we find out why a suitable partner is crucial. Read more

Don’t bite that phishing hook!

hackers-phishing-en
IT & telecom news / Solutions

Don’t bite that phishing hook!

Phishing, what is that again? Phishing is a form of online fraud in which cybercriminals try to get hold of the (bank) details, codes and credentials to their victims’ (bank) accounts. They do this using malicious e-mails, text messages, WhatsApp messages or social media messages containing a link to a fake website, a suspicious attachment or a request to download an app.

Research has shown that, without training, one in three European employees would be caught by a phishing email. After that first measurement, when employees had not yet received cybersecurity training, two more measurement moments followed. First an intermediate measurement, when employees had already been training for 90 days. At that point, the results were already much better, with an average falling from 29.9 percent (1 in 3) to 18.5 percent.

At the last measurement moment, training was attended at least on a monthly basis for one year. From that moment on, less than one in ten employees would fall for a phishing email (6.3 percent).

How does your organization perform?

Despite all (much-needed) IT security, it is often an employee who clicks on a wrong link, opens an unsafe attachment or worse, enters payment or login details on a rogue website. People therefore pose a major threat to the integrity of (company) data, not to mention the costs associated with data recovery.

With an initial audit and baseline measurement, we can analyze in detail how well your organization scores. With this information we can then define concrete action points or even roll out a training program for your employees.

Are you interested or do you want to know more about the possibilities? Let us know via the contact form below, or contact your account manager directly.

Source: ITdaily

How can we help? Get in touch with our experts.

Enter your details and we will contact you as soon as possible.


    We value your privacy and we only use the information you entered here in order to reply you.

    Or call us now!

    We are happy to discuss your project, in person or via video call. Request a free consult with one of our IT or telecom experts to get to know each other and to look into your particular situation.

    Stay updated on our news? Subscribe to our newsletter.