Proven track record
A cyber incident under control?
How long does it take companies to get a cyber incident under control?
• Less than a week: 77%
• Between one and four weeks: 15%
... of companies that have already experienced a cyber incident are worried to very worried about once more becoming a victim.
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
92%
... organizations indicate a shortage of specialized security staff in the IT department.
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
out of
10
4
The Cybersecurity Incident Response Team (CSIRT) is Proximus' fire brigade. It guards your cybersecurity and protects you from cyber attacks with audits and penetration tests, Vulnerability Management (as-a-service) and rapid incident response.
• Risk
Make use of our Information Security Consulting and Business Continuityservices, such as the creation of privacy policies, data flow mapping and raising cybersecurity awareness.
• Governance
In the healthcare sector, it is particularly important to protect personal data. GDPR has not only increased the protection of personal data and created an additional legal framework, it has also led to an increased awareness of privacy. By now, every major institution has a Data Protection Officer (DPO).
At the same time, care institutions and other actors in the sector must remain vigilant. mHealth and eHealth are evolving rapidly and offer a wide range of opportunities to improve our healthcare – ranging from prevention to care and post-treatment. Ensuring that this is done within the legal framework can sometimes be challenging: technological developments tend to evolve faster than legislation.
Notice anything?
For seven of ten companies facing a cyber incident, the incident was discovered internally, while 15% were made aware of it by third parties. An incident is not always immediately recognizable and requires continuous monitoring and analysis of the systems.
Top three cybersecurity incidents
- Phishing (35%)
- Malware (16% – mainly virus and/or ransomware)
- Spear-phising (16% – phishing targeting an individual)
... companies in Belgium and the Netherlands had to deal with a cyber incident in 2020. Yet only one in two organizations has an active cybersecurity strategy.
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
in
2
1
Thanks to GDPR Preparation Services, such as readiness assessment, gap assessment and Data Protection Officer (DPO) as-a-service, you will always be compliant with EU regulations.
• Compliance
- Learn more about our Managed Security Services
- or download the e-book
With Managed Security Services, you leave the management and control of your IT security entirely or partially to Proximus. With our GRC services, you are prepared for cybersecurity incidents and meet legal and regulatory requirements. We use a three-step approach from which you choose what you need:
Your care staff can only work together efficiently if they can rely on a solid and secure communication infrastructure. Read more about how better automation and collaboration give caregivers more time to spend on their core tasks.
Apps are no longer tied to the desktop and users expect to be able to switch seamlessly between desktops, tablets, and smartphones – anytime, anywhere. The trend of 'Bring Your Own Device’ has also gained a foothold in healthcare organizations. Indeed, institutions are increasingly recognizing the benefits of allowing their employees to use their personal mobile devices for professional purposes. With the increase in working from home during the Covid pandemic, this trend has clearly continued.
However convenient the connection between network, mobile devices and their users may be, they create potential dangers if not properly secured. Prevent leakage of your company data by investing in:
- Mobile Device Management: Open up your network to mobile devices without compromising your IT security.
- Unified Endpoint Management: Maintain full control of remote PCs, wirelessly.
- Mobile Threat Protection: Add a layer of security to your mobile devices.
These cybersecurity services are indispensable if you want your employees to work safely while on the move.
3
Security Managed Services
2
Enterprise Mobility Management
1
ICT Security Cyberprotection
chapter 3 – safe healthcare
Maar wat leveren die data nu concreet op? De tweede horde die maakbedrijven nemen, is die data op een overzichtelijke en efficiënte manier aan de medewerkers presenteren.
Guy De Winne (ST Engineering): “De voorbije jaren verzamelden we heel wat data, maar die zat verspreid over verschillende databases, zowel vanuit de productie en machines als uit de ondersteunende diensten. We wilden ervoor zorgen dat alle informatie gecentraliseerd werd in één datacube met verschillende views. Zodat elke medewerker vlot de juiste informatie voor zijn functie uit die centrale database kan halen.”
In 2021, we saw an exponential increase in the number of cyber attacks in the healthcare sector. This is a slap in the face for a sector that has already been hit hard by the pandemic. This highlights the importance of good cyber hygiene. Are you wondering if your cybersecurity is still up to date? Are you not completely sure that your patient data is sufficiently protected?
A widely shared network makes for better connected healthcare delivery, but it also opens more doors for cybercriminals. Moreover, it is not just devices that infect an IT infrastructure, but also applications and surfing to unsafe websites.
Therefore, secure not only your (cloud) infrastructure, but also your digital workstations with the most appropriate security solutions:
- Choose the right firewall for a secure infrastructure and make vulnerability management a central part of your business. Keep your IT infrastructure virus-free and your network secure.
- To protect your digital workplace, ensure secure and productive mobile devices. You should also analyze and monitor the behavior of your employees and facilitate access to different networks. Finally, protect your confidential business information from malware and intentional or accidental leaks.
- Read more about our ICT Security Cyberprotection
A reliable service begins with a secure network. Especially when care institutions join forces more often and exchange patient data on a daily basis. In addition, healthcare devices and apps, these days, are creating more and more personal data that needs to be stored securely. This can save many lives in the long run. Unfortunately, there are also challenges associated with sharing all that personal data.
chapter 3
The volume and sensitive nature of information held within the healthcare sector makes it an important and profitable target for criminals. In addition, healthcare is a vulnerable sector when it comes to cybersecurity. Shared communication networks between care providers, patients and devices allow of rapid exchange of information and automated processes, but also increase the risk of attacks from cybercriminals.
That is why you must protect your devices and data from security threats such as ransomware, DDoS and phishing. Detect malicious apps, be they local, cloud or hybrid. A secure system for you starts with a secure network from us.
Proven track record
Thanks to GDPR Preparation Services, such as readiness assessment, gap assessment and Data Protection Officer (DPO) as-a-service, you will always be compliant with EU regulations.
• Compliance
Het Cyber Security Incident Response Team (CSIRT) is de brandweer van Proximus en waakt over uw cybersecurity en beschermt u tegen cyberaanvallen met audits en penetratietests, Vulnerability Management (as-a-service) en snelle reactie op incidenten.
• Risk
Make use of our Information Security Consulting and Business Continuityservices, such as the creation of privacy policies, data flow mapping and raising cybersecurity awareness.
• Governance
Your care staff can only work together efficiently if they can rely on a solid and secure communication infrastructure. Read more about how better automation and collaboration give caregivers more time to spend on their core tasks.
How long does it take companies to get a cyber incident under control?
• Less than a week: 77%
• Between one and four weeks: 15%
A cyber incident under control?
... of companies that have already experienced a cyber incident are worried to very worried about once more becoming a victim.
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
92%
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
... organizations indicate a shortage of specialized security staff in the IT department.
out of
10
4
- Learn more about our Managed Security Services
- or download the e-book
With Managed Security Services, you leave the management and control of your IT security entirely or partially to Proximus. With our GRC services, you are prepared for cybersecurity incidents and meet legal and regulatory requirements. We use a three-step approach from which you choose what you need:
Apps are no longer tied to the desktop and users expect to be able to switch seamlessly between desktops, tablets, and smartphones – anytime, anywhere. The trend of 'Bring Your Own Device’ has also gained a foothold in healthcare organizations. Indeed, institutions are increasingly recognizing the benefits of allowing their employees to use their personal mobile devices for professional purposes. With the increase in working from home during the Covid pandemic, this trend has clearly continued.
However convenient the connection between network, mobile devices and their users may be, they create potential dangers if not properly secured. Prevent leakage of your company data by investing in:
- Mobile Device Management: Open up your network to mobile devices without compromising your IT security.
- Unified Endpoint Management: Maintain full control of remote PCs, wirelessly.
- Mobile Threat Protection: Add a layer of security to your mobile devices.
These cybersecurity services are indispensable if you want your employees to work safely while on the move.
For seven of ten companies facing a cyber incident, the incident was discovered internally, while 15% were made aware of it by third parties. An incident is not always immediately recognizable and requires continuous monitoring and analysis of the systems.
Notice anything?
- Read more about our ICT Security Cyberprotection
A widely shared network makes for better connected healthcare delivery, but it also opens more doors for cybercriminals. Moreover, it is not just devices that infect an IT infrastructure, but also applications and surfing to unsafe websites.
Therefore, secure not only your (cloud) infrastructure, but also your digital workstations with the most appropriate security solutions:
- Choose the right firewall for a secure infrastructure and make vulnerability management a central part of your business. Keep your IT infrastructure virus-free and your network secure.
- To protect your digital workplace, ensure secure and productive mobile devices. You should also analyze and monitor the behavior of your employees and facilitate access to different networks. Finally, protect your confidential business information from malware and intentional or accidental leaks.
In the healthcare sector, it is particularly important to protect personal data. GDPR has not only increased the protection of personal data and created an additional legal framework, it has also led to an increased awareness of privacy. By now, every major institution has a Data Protection Officer (DPO).
At the same time, care institutions and other actors in the sector must remain vigilant. mHealth and eHealth are evolving rapidly and offer a wide range of opportunities to improve our healthcare – ranging from prevention to care and post-treatment. Ensuring that this is done within the legal framework can sometimes be challenging: technological developments tend to evolve faster than legislation.
In 2021, we saw an exponential increase in the number of cyber attacks in the healthcare sector. This is a slap in the face for a sector that has already been hit hard by the pandemic. This highlights the importance of good cyber hygiene. Are you wondering if your cybersecurity is still up to date? Are you not completely sure that your patient data is sufficiently protected?
Top three cybersecurity incidents
- Phishing (35%)
- Malware (16% – mainly virus and/or ransomware)
- Spear-phising (16% – phishing targeting an individual)
... companies in Belgium and the Netherlands had to deal with a cyber incident in 2020. Yet only one in two organizations has an active cybersecurity strategy.
Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020
in
2
1
The volume and sensitive nature of information held within the healthcare sector makes it an important and profitable target for criminals. In addition, healthcare is a vulnerable sector when it comes to cybersecurity. Shared communication networks between care providers, patients and devices allow of rapid exchange of information and automated processes, but also increase the risk of attacks from cybercriminals.
That is why you must protectyour devices and data from security threats such as ransomware, DDoS and phishing. Detect malicious apps, be they local, cloud or hybrid. A secure system for you starts with a secure network from us.
A reliable service begins with a secure network. Especially when care institutions join forces more often and exchange patient data on a daily basis. In addition, healthcare devices and apps, these days, are creating more and more personal data that needs to be stored securely. This can save many lives in the long run. Unfortunately, there are also challenges associated with sharing all that personal data.
chapter 3