Skip to main content

Frequently asked questions

The world of cybersecurity is ever-changing. Even if you’re an IT specialist – with a long to-do list in your organisation – it is not easy to be up to date on each new trend. A cyber specialist at your side is no luxury. Because the safety and survival of your company could be at stake.

Any questions for us?

Every day there are new terms, new ways in which criminals want to break in. We will make a list for you. Can’t find the answer you are looking for?

Send us an email!

Frequently asked questions

Which data do you back up?

A backup is a copy of important data. If human error or a cyber-attack occurs, you can easily restore this data. Your backup should be in a secure location, separate from the source data.
Organisations collect a huge amount of data and documents. When you make a backup, you first of all make a copy of the documents that are important for the operation. That is why you make a data classification beforehand: what is primary for your operation (red)? What is useful, but not absolutely necessary to do your job (orange)? The documents that are not important or even superfluous can be classified green.

Do backups make sense?

Your business files can be lost in many ways, such as through fire, a cyber-attack or human error. With a backup you always keep at least one, and preferably several backups of important data from your business. In case of loss, you can restore the backup and lose a minimum of important data. Of course you need to make sure that this is in a safe location and that you can easily restore the data. It is best to have the backup process automated. That way, nobody forgets to take the backup, and it is always in the agreed upon place, separate from the source data.

Is a cloud as safe as a backup?

The cloud is like a rented garage: it is and remains someone else’s property. How secure your data is depends on the “rental contract” you entered into. So it is important to be aware of the small print. A cloud seems untouchable, but it is not. With ransomware, criminals can also get in.
So even if you feel your documents are safe in the cloud, it is best to back up data that is important to the operational running of your business.

Does cyber insurance make sense?

At Netcure, we don’t think this is an unnecessary luxury. It can obviously be seen separate from the safety measures that you have to take anyway. However, it can be a safety net in case of emergencies. If the attack is severe, it can even save your business. Make sure to take out the right policy with the correct cover. Netcure can help you make the right choice.

How can you protect your domain name?

Your domain name is unique and must be registered. More than a signpost on the Internet, your domain name is your “online showroom”, the most important expression of your digital identity. If criminals steal this, they can “phish” with your email addresses. The abuse of your a domain name is a successful technique for sending fake invoices or payment orders to your customers in your name, for example.

Netcure has various domain protection services, in order to be able to propose the right one for each customer. The result? Just as you would place a camera on your premises, an SPF/DKIM/DMARC security system works. Your domain is less attractive because it is harder to abuse. In addition, it gives you an overview of all email use of your domain, both legitimate and fraudulent. That way, you can maintain a helicopter view (just like a surveillance camera) of everything that comes in and goes out of your domain.

Any other advantages? One more: your domain gets a better reputation. Your company’s emails are labelled as secure by firewalls. They are then less likely to end up in the spam.

A nice bonus is that it is a fairly inexpensive way to protect your domains and your good name. Netcure’s specialists will relieve you of all your worries by providing the correct configuration and follow-up. Do the check!

Why do criminals want to steal my data?

Your mailbox contains a lot of data that gives criminals access to colleagues, suppliers and customers. They can get an insight into the company culture and your relationships. This data can be sold to competitors or can be abused to set up a scam. If criminals encrypt your data, you cannot use it any longer unless you pay them a hefty ransom (and even then, you depend on their goodwill to release everything).

Criminals are always opportunists. The choose their victim, preferably an organisation that is vulnerable and therefore poorly protected. Everyone has data they don’t want to lose or can’t afford to lose. So everyone is a potential target.

What is the best way to protect your website?

There are free tools on the market, but what is free for us is also free for criminals. This makes these systems more vulnerable to abuse. In the paying systems, there are different types. A cyber specialist like Netcure will help you make the right choice for your organisation.

What is the most common way for criminals to enter your systems?

You may not expect it, but your employees are the most important risk factor. They are often unaware of the dangers, which makes it difficult to predict which trap they could fall into and which they will not.
Each employee has a separate identity in your organisation. The granting of rights is often quite lenient, which can put your protection at risk. Sometimes you also see colleagues working on each other’s accounts. This can cause problems. Keep in mind that employees come and go. For an IT administrator, this fact often poses a challenge.

How can you make employees aware of the dangers?

The number of employees causes IT staff headaches in many organisations. They like to click and are often unaware of the dangers. Such ignorance could do a lot of harm to the organisation. Therefore, it is a good idea to organise basic training and update sessions on a regular basis, so that everyone stays aware of cybersecurity.
Automation of certain processes can protect your organisation, because it eliminates the consequence of human errors.

Why would you volunteer to be hacked?

An ethical hacker can identify the gaps in your security before (rogue) others do it for you. You get a clear and detailed report that your IT partner or coordinator can use to start improving your infrastructure, apps or websites.
You make appointments with the ethical hacker beforehand, and discuss the test methods.
This is a tried and tested method for a new infrastructure, app or website. Companies also use it during an audit, for example, in preparation for a certification procedure. A report contains points of improvement, with which a company can start a cybersecurity track. An ethical hacker can also test later whether the measures taken are sufficient.

Why pay for systems when there are free alternatives?

Free is also free for criminals. The gaps in these systems are also exposed to them. You think you’re safe, but they still manage to get in. Compare it to a back door that you lock. The door is locked, so you feel safe. But a shrewd burglar can still get in without a problem with the right equipment. A camera and an alarm provide even more adequate protection.

Why do you need a cyber specialist in addition to your own IT partner?

Cybersecurity is a fast-moving world, with new threats emerging every day. If you have already invested in good security infrastructure, that’s great, but unfortunately no guarantee that things will not go wrong. For Netcure, security is a process, not a product or a solution. We keep an eye on the latest trends and risks for our customers and ensure the security of the systems. As far as we are concerned, this can be done without any problem alongside your usual IT service provider.

How to choose a secure password?

A good password doesn’t have to be complicated. Make sure to include spaces, punctuation or special characters. A sentence also works better than a word. If you deliberately make a spelling mistake (gotcha!) in one of the words, you build in another difficulty.

How can I protect my password from criminals?

Criminals can steal your password through leaked user databases (a data leak) or through phishing. With a few tips, you can make it a lot harder for them.

  • A password manager is a good tool to keep track of your passwords.
  • Don’t share it with others, and don’t write it down either.
  • Just because you have found a strong password does not mean you can use it everywhere. Provide different passwords in your apps.

Why could my company be of interest to cybercriminals?

Just because your business is small or does not operate internationally does not mean you cannot be targeted. There are many reasons why cybercriminals want to extort ransom money or data from you. Who you are does not matter to them. Any company connected to the internet is a potential target. So everyone needs to watch their step and take the right precautions.