Category Archives: Information Security

Free webinars on CyberSecurity for Small & Medium Businesses

Two years ago, Apalala has been selected by the Belgian Center for CyberSecurity to help create a set of webinars for Small & Medium Businesses. The goal was to educate Belgian entrepreneurs with the basic knowledge required to protect their business.

After a few difficulties, some delays and a new federal government in construction, the webinars have been officially published a few days ago.

You can find them in French here: https://ccb.belgium.be/fr/publication/webinaires-pour-les-organisations or in Dutch here: https://ccb.belgium.be/nl/publication/webinars-over-cyberveiligheid

One of the video in French
One of the video in Dutch

Some of the scenarios on the cyber threats haven’t been published but we will probably propose them in another format soon. Keep in touch!

The impact of cyber crime on Belgian Businesses

In 2017, the Belgian Cost of Cybercrime project (KUL) published the results of an enlightening study aiming to measure the impact of cybercrime, and more broadly cyber attacks, on Belgian Businesses.

We can highligt two results from this paper: First most businesses have been hit by one form or another of cyberattack, some even more than once a year. So, the likelihood of being hit is quite high.

Second, the average cost per incident is relatively low, most of them below 500€, although in some cases, it was above 10.000€. It surely depends on the kind of business you are and on the size of your company. Meaning SME shouldn’t have to spend a fortune in protection measure.

 

You can find the report here: https://bcc-project.be/surveys/wp4-2-the-impact-of-cybercrime-on-belgian.pdf

Are you prepared to face a TDOS?

Recently, DHS (US Department of Homeland Security) announced they are developing with private partners a solution to mitigate Telephony Denial of Services (TDOS) against emergency numbers and other critical phone numbers.

For the past years TDOS attacks seems to have flourish in the US. They are often used to claim a ransom to the targeted number owner.

If you have already made a Business Impact Analysis on your telephony system, your probably know how much one day of downtime might cost you. You probably have some solutions in place but, do they protect you against a TDOS?

Don’t forget to add TDOS to your list of threats if it is relevant for your business.

Further readings: