quickscan for cyber security & hacking

Calculation tools

Quickscan for cyber security & hacking

Today we live in a digital society where we are increasingly confronted with new technologies. Nevertheless, a digital network also has its advantages: information flows faster, knowledge is filtered faster and innovation emerges faster. The digital economy frequently leads to higher productivity.

Even so, this is where the main issue lies: information (or data). Data is very important in an organisation and so hackers try to steal that information by exploiting the vulnerabilities of both computer systems and people.

We've developed a tool for you to do a simple check of whether you're well protected against hackers and cybercrime. Below are a number of statements that you can answer with true or false. If you answer 5 or more questions as true, you should contact your relationship manager as soon as possible. He will guide you further in protecting your important data. Data is the new gold, protecting it is our newest challenge.

Quickscan for cyber security & hacking

There is no inventory that summarizes all IT information (i.e. data, software and hardware). This list states very clearly what data is stored where.

You store or process personal data. Personal data is data that may explicitly (e.g. with an address or email) or implicitly (e.g. via a web shop or IP address) refer to physical persons and their private data. Be sure to indicate 'true' if you have a combination of such data.

You store or process sensitive personal data. Sensitive personal data include, for example, medical data (e.g. biometrics and sexual orientation).

You work with a provider who stores data for you in the cloud. This might be either a local IT provider with its own data centre, or a local IT provider that leases its own data centre or a cloud service such as Dropbox, OneDrive or Google Drive.

There is no security policy within the company. A security policy is a set of rules and procedures that describe IT security in your company.

Not every laptop, desktop and server has an antivirus system installed on it.

The other software is not up to date (e.g. operating system, browser, Flash, Acrobat, Word and Excel). Updates are not installed systematically, and you sometimes work with versions that are no longer supported (i.e. updates are no longer available).

You sometimes send emails to prospects as part of direct marketing.

You have already been a victim of some form of cyber hacking: ransomware, data theft, hacking of your website, insider hacking, etc.

You use a web shop or platform that both customers and staff can log into.

Suppose all the data in your most critical location is suddenly gone (e.g., in a fire). Can your business remain operational for two days without using any IT?

You use the same password for multiple applications.

You occasionally receive phishing emails.

You do not make a weekly backup (which is kept off-site).

You sometimes receive very confidential data via email, without encryption.

We have a team of specialists who closely monitor new legislation on a daily basis. If you would like more information on specific regulations in force, please contact us at contact@vdl.be.

Vandelanotte and its employees have developed these tools with the necessary care and attention. These tools therefore provide the most complete and up-to-date results possible. However, despite all efforts in the design of the calculation tools, Vandelanotte cannot guarantee their completeness and accuracy. The use of these tools is at your own responsibility and risk.