This publication uses cookies

We use functional and analytical cookies to improve our website. In addition, third parties place tracking cookies to display personalised advertisements on social media. By clicking accept you consent to the placement of these cookies.

Proven track record

A cyber incident under control?

How long does it take companies to get a cyber incident under control?

• Less than a week: 77%

• Between one and four weeks: 15%

... of companies that have already experienced a cyber incident are worried to very worried about once more becoming a victim.

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

92%

... organizations indicate a shortage of specialized security staff in the IT department.

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

out of

10

4

The Cybersecurity Incident Response Team (CSIRT) is Proximus' fire brigade. It guards your cybersecurity and protects you from cyber attacks with audits and penetration tests, Vulnerability Management (as-a-service) and rapid incident response.

• Risk

Make use of our Information Security Consulting and Business Continuityservices, such as the creation of privacy policies, data flow mapping and raising cybersecurity awareness.

• Governance

Guardian of your privacy

In the healthcare sector, it is particularly important to protect personal data. GDPR has not only increased the protection of personal data and created an additional legal framework, it has also led to an increased awareness of privacy. By now, every major institution has a Data Protection Officer (DPO).

 At the same time, care institutions and other actors in the sector must remain vigilant. mHealth and eHealth are evolving rapidly and offer a wide range of opportunities to improve our healthcare – ranging from prevention to care and post-treatment. Ensuring that this is done within the legal framework can sometimes be challenging: technological developments tend to evolve faster than legislation.

Notice anything?

For seven of ten companies facing a cyber incident, the incident was discovered internally, while 15% were made aware of it by third parties. An incident is not always immediately recognizable and requires continuous monitoring and analysis of the systems.

Top three cybersecurity incidents

  1.  Phishing (35%)
  2.  Malware (16% –  mainly virus and/or ransomware)
  3.  Spear-phising (16% – phishing targeting an individual)

... companies in Belgium and the Netherlands had to deal with a cyber incident in 2020. Yet only one in two organizations has an active cybersecurity strategy.

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

in

2

1

Thanks to GDPR Preparation Services, such as readiness assessment, gap assessment and Data Protection Officer (DPO) as-a-service, you will always be compliant with EU regulations.

• Compliance

Want to know more?
3. Be assured with Security Managed Services 

With Managed Security Services, you leave the management and control of your IT security entirely or partially to Proximus. With our GRC services, you are prepared for cybersecurity incidents and meet legal and regulatory requirements. We use a three-step approach from which you choose what you need:

Want to know more?
2. Manage and secure your mobile devices

Apps are no longer tied to the desktop and users expect to be able to switch seamlessly between desktops, tablets, and smartphones – anytime, anywhere. The trend of 'Bring Your Own Device’ has also gained a foothold in healthcare organizations. Indeed, institutions are increasingly recognizing the benefits of allowing their employees to use their personal mobile devices for professional purposes. With the increase in working from home during the Covid pandemic, this trend has clearly continued.

However convenient the connection between network, mobile devices and their users may be, they create potential dangers if not properly secured. Prevent leakage of your company data by investing in:

  • Mobile Device Management: Open up your network to mobile devices without compromising your IT security.
  • Unified Endpoint Management: Maintain full control of remote PCs, wirelessly.
  • Mobile Threat Protection: Add a layer of security to your mobile devices.

These cybersecurity services are indispensable if you want your employees to work safely while on the move.

chapter 3 – safe healthcare

Maar wat leveren die data nu concreet op? De tweede horde die maakbedrijven nemen, is die data op een overzichtelijke en efficiënte manier aan de medewerkers presenteren.  

Guy De Winne (ST Engineering): “De voorbije jaren verzamelden we heel wat data, maar die zat verspreid over verschillende databases, zowel vanuit de productie en machines als uit de ondersteunende diensten. We wilden ervoor zorgen dat alle informatie gecentraliseerd werd in één datacube met verschillende views. Zodat elke medewerker vlot de juiste informatie voor zijn functie uit die centrale database kan halen.” 


Cyber attacks in the healthcare sector

In 2021, we saw an exponential increase in the number of cyber attacks in the healthcare sector. This is a slap in the face for a sector that has already been hit hard by the pandemic. This highlights the importance of good cyber hygiene. Are you wondering if your cybersecurity is still up to date? Are you not completely sure that your patient data is sufficiently protected?

1. Secure your network and the data you share with it 

A widely shared network makes for better connected healthcare delivery, but it also opens more doors for cybercriminals. Moreover, it is not just devices that infect an IT infrastructure, but also applications and surfing to unsafe websites.

Therefore, secure not only your (cloud) infrastructure, but also your digital workstations with the most appropriate security solutions:

  • Choose the right firewall for a secure infrastructure and make vulnerability management a central part of your business. Keep your IT infrastructure virus-free and your network secure.

  •  To protect your digital workplace, ensure secure and productive mobile devices. You should also analyze and monitor the behavior of your employees and facilitate access to different networks. Finally, protect your confidential business information from malware and intentional or accidental leaks.
Want to know more?

A reliable service begins with a secure network. Especially when care institutions join forces more often and exchange patient data on a daily basis. In addition, healthcare devices and apps, these days, are creating more and more personal data that needs to be stored securely. This can save many lives in the long run. Unfortunately, there are also challenges associated with sharing all that personal data.

Safe healthcare in a protected environment

chapter 3

The volume and sensitive nature of information held within the healthcare sector makes it an important and profitable target for criminals. In addition, healthcare is a vulnerable sector when it comes to cybersecurity. Shared communication networks between care providers, patients and devices allow of rapid exchange of information and automated processes, but also increase the risk of attacks from cybercriminals.

That is why you must protect your devices and data from security threats such as ransomware, DDoS and phishing. Detect malicious apps, be they local, cloud or hybrid. A secure system for you starts with a secure network from us.

Proven track record

Thanks to GDPR Preparation Services, such as readiness assessment, gap assessment and Data Protection Officer (DPO) as-a-service, you will always be compliant with EU regulations.

• Compliance

Het Cyber Security Incident Response Team (CSIRT) is de brandweer van Proximus en waakt over uw cybersecurity en beschermt u tegen cyberaanvallen met audits en penetratietests, Vulnerability Management (as-a-service) en snelle reactie op incidenten.

• Risk

Make use of our Information Security Consulting and Business Continuityservices, such as the creation of privacy policies, data flow mapping and raising cybersecurity awareness.

• Governance

Your care staff can only work together efficiently if they can rely on a solid and secure communication infrastructure. Read more about how better automation and collaboration give caregivers more time to spend on their core tasks.

How long does it take companies to get a cyber incident under control?

• Less than a week: 77%

• Between one and four weeks: 15%

A cyber incident under control?

... of companies that have already experienced a cyber incident are worried to very worried about once more becoming a victim.

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

92%

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

... organizations indicate a shortage of specialized security staff in the IT department.

out of

10

4

Want to know more?

With Managed Security Services, you leave the management and control of your IT security entirely or partially to Proximus. With our GRC services, you are prepared for cybersecurity incidents and meet legal and regulatory requirements. We use a three-step approach from which you choose what you need:

3. Be assured with Security Managed Services 

Apps are no longer tied to the desktop and users expect to be able to switch seamlessly between desktops, tablets, and smartphones – anytime, anywhere. The trend of 'Bring Your Own Device’ has also gained a foothold in healthcare organizations. Indeed, institutions are increasingly recognizing the benefits of allowing their employees to use their personal mobile devices for professional purposes. With the increase in working from home during the Covid pandemic, this trend has clearly continued.

However convenient the connection between network, mobile devices and their users may be, they create potential dangers if not properly secured. Prevent leakage of your company data by investing in:

  • Mobile Device Management: Open up your network to mobile devices without compromising your IT security.
  • Unified Endpoint Management: Maintain full control of remote PCs, wirelessly.
  • Mobile Threat Protection: Add a layer of security to your mobile devices.

These cybersecurity services are indispensable if you want your employees to work safely while on the move.

2. Manage and secure your mobile devices

For seven of ten companies facing a cyber incident, the incident was discovered internally, while 15% were made aware of it by third parties. An incident is not always immediately recognizable and requires continuous monitoring and analysis of the systems.

Notice anything?

Want to know more?

A widely shared network makes for better connected healthcare delivery, but it also opens more doors for cybercriminals. Moreover, it is not just devices that infect an IT infrastructure, but also applications and surfing to unsafe websites.

Therefore, secure not only your (cloud) infrastructure, but also your digital workstations with the most appropriate security solutions:

  • Choose the right firewall for a secure infrastructure and make vulnerability management a central part of your business. Keep your IT infrastructure virus-free and your network secure.

  •  To protect your digital workplace, ensure secure and productive mobile devices. You should also analyze and monitor the behavior of your employees and facilitate access to different networks. Finally, protect your confidential business information from malware and intentional or accidental leaks.
1. Secure your network and the data you share with it 

In the healthcare sector, it is particularly important to protect personal data. GDPR has not only increased the protection of personal data and created an additional legal framework, it has also led to an increased awareness of privacy. By now, every major institution has a Data Protection Officer (DPO).

 At the same time, care institutions and other actors in the sector must remain vigilant. mHealth and eHealth are evolving rapidly and offer a wide range of opportunities to improve our healthcare – ranging from prevention to care and post-treatment. Ensuring that this is done within the legal framework can sometimes be challenging: technological developments tend to evolve faster than legislation.

Guardian of your privacy
Want to know more?

In 2021, we saw an exponential increase in the number of cyber attacks in the healthcare sector. This is a slap in the face for a sector that has already been hit hard by the pandemic. This highlights the importance of good cyber hygiene. Are you wondering if your cybersecurity is still up to date? Are you not completely sure that your patient data is sufficiently protected?

Cyber attacks in the healthcare sector

Top three cybersecurity incidents

  1.  Phishing (35%)
  2.  Malware (16% –  mainly virus and/or ransomware)
  3.  Spear-phising (16% – phishing targeting an individual)

... companies in Belgium and the Netherlands had to deal with a cyber incident in 2020. Yet only one in two organizations has an active cybersecurity strategy.

Source: Proximus, Proximus SpearIT, Davinsi Labs, Telindus Nederland, 2020

in

2

1

The volume and sensitive nature of information held within the healthcare sector makes it an important and profitable target for criminals. In addition, healthcare is a vulnerable sector when it comes to cybersecurity. Shared communication networks between care providers, patients and devices allow of rapid exchange of information and automated processes, but also increase the risk of attacks from cybercriminals.

 That is why you must protectyour devices and data from security threats such as ransomware, DDoS and phishing. Detect malicious apps, be they local, cloud or hybrid. A secure system for you starts with a secure network from us.

A reliable service begins with a secure network. Especially when care institutions join forces more often and exchange patient data on a daily basis. In addition, healthcare devices and apps, these days, are creating more and more personal data that needs to be stored securely. This can save many lives in the long run. Unfortunately, there are also challenges associated with sharing all that personal data.

Safe healthcare in a protected environment

chapter 3