Blog

Quick updates

The explosions at the Nord Stream 1 and 2 gas pipelines in 2022 starkly highlighted the vulnerability of our underwater infrastructure. In addition to pipelines essential for energy supply, digital infrastructure is increasingly seen as a potential target for sabotage. Experts warn that digital infrastructure, such as undersea data cables, is a critical and vulnerable part of our modern society. Read more

NIS2 is the next major regulation after GDPR and NIS(1) that organizations need to contend with. Our goal is to shed light on this new directive with a realistic perspective, to determine its applicability to our average SME customer, and to explore how we can assist in compliance. Read more

The holiday season often brings the joy of unwrapping new gadgets, and one exciting addition could be a shiny new smartphone. However, before you bid farewell to your trusted old device, it's crucial to ensure a smooth transition, especially regarding your Multi-Factor Authentication (MFA) profiles. Read more

We start with the conclusion of this article because we cannot emphasize it enough. But, of course, we want you to stay interested and keep on reading. That is why we already reveal that we will provide you with a clear and comprehensible overview of the different forms of social engineering. We will also explain how you can minimize the risks for your company as much as possible. Read more

K-Force Full Cloud: Made in Belgium and NIS2-Ready

K-Force Belgium cloud platform
IT & telecom news

K-Force Full Cloud: Made in Belgium and NIS2-Ready

The explosions at the Nord Stream 1 and 2 gas pipelines in 2022 starkly highlighted the vulnerability of our underwater infrastructure. In addition to pipelines essential for energy supply, digital infrastructure is increasingly seen as a potential target for sabotage. Experts warn that digital infrastructure, such as undersea data cables, is a critical and vulnerable part of our modern society.

The EU’s Network and Information Systems (NIS2) directive underscores the need to protect digital infrastructure from threats. Geopolitical tensions, particularly from Russia, China, and North Korea, increase the likelihood of targeted attacks on this infrastructure. This comes at a time when many companies are increasingly relying on cloud solutions from major players with data centers in North America, such as AWS and Azure, exposing them to significant risks.

submarine-cable-map

Source: www.submarinecablemap.com

Limited number of undersea cables and regulations

Currently, there are only about eight major fiber-optic cables facilitating internet traffic between the EU and North America. This limited number makes the infrastructure particularly vulnerable. Moreover, there is no specific legislative body overseeing these cables in international waters, further exacerbating the risk.

Given the current geopolitical threats and the limitations of the undersea network infrastructure, it is wise to rely on high-quality data centers within the EU. This not only reduces risks associated with geopolitical tensions but also ensures better compliance with the NIS2 directive and other security standards. As a supplier to a NIS2 entity, you may be contractually required to implement cybersecurity measures. Even if you do not yet need to fully comply with the latest version of the NIS2 directive, it is a good idea to be proactive. This way, you will have a digital advantage when your organization needs to become compliant. Implementing such extensive cybersecurity measures is not something you can do overnight.

The Belgian solution: our Full Cloud solution

With SME our Full Cloud solution, your applications and business data are housed in Proximus’s highly secure data centers in Belgium. We ensure the necessary security measures according to current standards and provide daily backups of all data and applications. This way, you can meet NIS2 requirements and be much less dependent on overseas connections. Additionally, you can rely on local support in your own language for any questions or issues.

Is your IT still up-to-date?

Whether you already use our Belgian cloud solution or not, the field of cybersecurity evolves rapidly. A few years ago, it was unthinkable that Belgian SMEs might need to comply with the so-called NIS legislation. Therefore, it is very likely that the environments set up back then no longer meet today’s or upcoming standards. We offer various types of audits to reassess your IT environment and identify weak points. Our approach is always tailored to the specific situation and needs of your SME. No general theories and principles, but practical advice you can implement.

Stay updated on our news? Subscribe to our newsletter.



    How can we help? Get in touch with our experts.

    Enter your details and we will contact you as soon as possible.


      We value your privacy and we only use the information you entered here in order to reply you.

      Or call us now!

      We are happy to discuss your project, in person or via video call. Request a free consult with one of our IT or telecom experts to get to know each other and to look into your particular situation.