Identify cyber risks

Published by:
Digital Trust Center
2 min read

Cyber incidents and attacks can have a major impact on your business. You stand to lose a lot. That is why it is important to consider the elements that you definitely do not want to lose, your “crown jewels”. What risks pose a threat to these interests that need to be protected?

Animation

Watch this short animation made by DTC about identifying vulnerabilities. The video comes with English subtitles. You can download the media files here:

Why this basic principle?

By identifying important data, where it is located, and how access is organised, you may discover weak spots. What risks exist in and around important IT systems? Can you reduce these risks? A good understanding of your risks enables you to make informed choices about the measures to be taken and the associated investments to increase cyber resilience.

What can you do?

  1. Make an inventory of the IT components (in Dutch) and make a risk analysis (in Dutch).
  2. Update this inventory every 6 months. Schedule this activity in your calendar.
  3. Discuss the importance and content of the inventory with colleagues, employees, suppliers, and/or customers. Discuss everyone's responsibilities, record agreements with your IT supplier (in Dutch), and ensure that they are complied with. The weakest link determines the strength of the chain.
  4. If you no longer have access to your systems, you want to be able to fall back on data still available to you. Keep a hardcopy fallback and recovery plan (in Dutch), a contact list and contract information in an accessible place so that you can act quickly in the event of an incident.

In addition

Is your company dealing with a cyber incident? Then view the information and tips (in Dutch) on the website of the Digital Trust Center and read what you can do to solve the problems.

Read more about the 5 basic principles of running a secure digital business.

External links

Questions relating to this article?

Please contact Digital Trust Center