Choose your language:
Calculation tools

Quickscan for cyber security & hacking

Today we live in a digital society where we are increasingly confronted with new technologies. Nevertheless, a digital network also has its advantages: information flows faster, knowledge is filtered faster and innovation emerges faster. The digital economy frequently leads to higher productivity. Even so, this is where the main issue lies: information (or data). Data is very important in an organisation and so hackers try to steal that information by exploiting the vulnerabilities of both computer systems and people.

We've developed a tool for you to do a simple check of whether you're well protected against hackers and cybercrime. Below are a number of statements that you can answer with true or false. If you answer 5 or more questions as true, you should contact your relationship manager as soon as possible. He will guide you further in protecting your important data. Data is the new gold, protecting it is our newest challenge.
Name is mandatory.
E-mail address is mandatory.
Place of residence is mandatory.
privacy policy
 
true
false
There is no inventory in which all IT information (= data, software, hardware) is summarised. This list clearly states which information is stored where.
You store or edit personal data. Personal data are data that can explicitly (address, e-mail) or implicitly (webshop, IP address) refer to physical persons and their private data. Please indicate "true" if you have a combination of data.
You store or process sensitive personal data. Sensitive personal data are, for example, medical data (biometrics, sexual orientation, etc.).
You work with a provider that stores data for you in the cloud. This can either be a local IT supplier with its own data centre, a local IT supplier that hires a data centre itself or a cloud service such as Dropbox, OneDrive, Google Drive.
There is no security policy within the company. A security policy is a set of rules and procedures that describe the IT security in your company.
There is no antivirus system on every laptop, desktop and server.
The other software is not up-to-date (operating system, browser, Flash, Acrobat, Word, Excel, other applications): you do not systematically execute the latest updates, and you sometimes work with versions that no longer require updates.
You sometimes send e-mails to prospects in the context of direct marketing.
You have already been a victim of some form of cyber hacking: ransomware, theft of data, hacking of your website, insider hacking, etc.
You use a webshop or a platform where both customers and staff can log in.
Suppose that all data at your most critical location suddenly disappears (e.g. in the event of a fire) - can your company remain active for two days without any form of IT use?
You use the same password for multiple applications.
You occasionally receive phishing e-mails.
You do not make a weekly backup (which is stored outside the company building).
You sometimes receive very confidential data via e-mail without encryption.
Please answer all questions.

Result

Thank you for running this tool to see if you are well protected against hackers and cybercrime. The results from this tool are automatically sent to our Cyber ​​Security specialist and your eventual customer service manager. Are you not yet a customer? Then we will contact you without any obligation.

Your risk: LOW RISK
Thank you for running this tool to see if you are well protected against hackers and cybercrime. The results from this tool are automatically sent to our Cyber ​​Security specialist and your eventual customer service manager. Are you not yet a customer? Then we will contact you without any obligation.

Your risk: HIGH RISK
Thank you for running this tool to see if you are well protected against hackers and cybercrime. The results from this tool are automatically sent to our Cyber ​​Security specialist and your eventual customer service manager. Are you not yet a customer? Then we will contact you without any obligation.

Your risk: EXTREME RISK
Disclaimer
Vandelanotte and its staff have devoted the necessary care and attention to the development of these tools. This tool therefore provides the most complete and up-to-date result. Despite all efforts in designing the calculation programmes, Vandelanotte cannot guarantee their completeness and accuracy. The use of these tools is at your own responsibility and risk.