This publication uses cookies

We use functional and analytical cookies to improve our website. In addition, third parties place tracking cookies to display personalised advertisements on social media. By clicking accept you consent to the placement of these cookies.

A DDoS attack renders a server or IT infrastructure unavailable. How can you prepare for this, respond appropriately and recover quickly? Large corporations are not the only target. SMEs can protect themselves against cybercrime in 5 simple steps.

in a cyber attack?

How resilient is your organization 

Resilience

The result of a successful attack is server bandwidth saturation or even system resource exhaustion. Effective protection against these attacks requires a solution capable of mitigating attacks at the level of the internet provider. This also needs to be complemented with an on-site solution capable of blocking application attacks.

DDOS, storming of IT infrastructure

The rise of remote working is a dream come true for cybercriminals. More connections mean a greater risk of breaches. According to Senhaji, no sector is spared. “Banks, of course, but the health sector, retail, and education have all been hit hard. The attacks have more and more impact and follow a well-established playbook. The watchword is anticipation, and of course, we support companies with tailored solutions.”

All economic sectors

Technically, DDoS can be controlled upstream. De Souter offers a step-by-step plan. “Map existing infrastructure and remove any obsolete or unused systems exposed to the internet. Critical systems must then be analyzed to determine the protection budget you need to allocate to them. Last but not least, test the anti-DDoS configurations using, for example, the simulation tool from Davinsi Labs.” “Cloud and on-site anti-DDoS solutions have their advantages and limitations. They complement each other. DDoS is a matter of time, regular testing and long-term maintenance,” adds Senhaji.

Analyze, configure, and test

is an IT Security Consultant and DDoS Specialist at Proximus. For 20 years, he has followed emerging IT security technologies and the rapid development of cybercrime.

Mounir Senhaji 

Thimo De Souter 

is a Security Specialist, ethical hacker and Lead Developer of the Davinsi Labs DDoS simulator. He shares his cybersecurity expertise and his extensive experience with Davinsi Labs, one of the Proximus accelerators.

There are also viable solutions for small organizations to protect their IT infrastructure against cyber attacks.

Protect your SME against cybercriminals in 5 easy steps

Step 1

Map the environment. What technologies does the company possess? How many and which users are there? What about servers and workstations? Where is the most critical business data? And so on.

Step 2

Collect and centralize company cybersecurity logs. In short, keep a security log that contains security-related information such as endpoints, network components, cloud services, VPN logs...

Step 3

Enable detection software to analyze the logs. This will help you discover patterns that indicate a potential attack.

Step 4

Follow up on the incidents that you have discovered from an analysis of the logs. Find out where they come from and which systems and accounts may have been compromised, as well as which valuable business data is at risk.

Step 5

Have operational security teams get to the root of the problem.

IT security is therefore not a one-off task, but requires strategy and continuous monitoring and adjustment. So don't rush into it, but work out a complete security policy based on four aspects: Predict, Prevent, Detect and Respond.

Map out the IT security rules, how the monitoring will take place, who can respond to data breaches, and so on. With this 360° approach, you gain control over the IT security of your organization and achieve the best results.

360° approach

Get to work with the 360° approach?

First read the IT security e-guide with useful tips and tricks from Proximus Accelerator SpearIT.

predict

  • Risk prioritization
  • Anticipate threaths
  • Baseline systems & your IT security posture

respond

  • Analytics
  • Vulnerability patching
  • Incident response

prevent

  • Protect your endpoints
  • Protect your network
  • Protect your data

detect

  • Monitoring
  • Log correlation
  • IT security reporting

Not every company has the capacity to organize a 360° approach. A cybersecurity partner who offers solutions such as managed services packages may be the answer.  A strong Managed Services Partner is ready for you.

Resilience

How resilient is your organization 

in a cyber attack?

A DDoS attack renders a server or IT infrastructure unavailable. How can you prepare for this, respond appropriately and recover quickly? Large corporations are not the only target. SMEs can protect themselves against cybercrime in 5 simple steps.

DDOS, storming of IT infrastructure

The result of a successful attack is server bandwidth saturation or even system resource exhaustion. Effective protection against these attacks requires a solution capable of mitigating attacks at the level of the internet provider. This also needs to be complemented with an on-site solution capable of blocking application attacks.

All economic sectors

The rise of remote working is a dream come true for cybercriminals. More connections mean a greater risk of breaches. According to Senhaji, no sector is spared. “Banks, of course, but the health sector, retail, and education have all been hit hard. The attacks have more and more impact and follow a well-established playbook. The watchword is anticipation, and of course, we support companies with tailored solutions.”

Analyze, configure, and test

Technically, DDoS can be controlled upstream. De Souter offers a step-by-step plan. “Map existing infrastructure and remove any obsolete or unused systems exposed to the internet. Critical systems must then be analyzed to determine the protection budget you need to allocate to them. Last but not least, test the anti-DDoS configurations using, for example, the simulation tool from Davinsi Labs.” “Cloud and on-site anti-DDoS solutions have their advantages and limitations. They complement each other. DDoS is a matter of time, regular testing and long-term maintenance,” adds Senhaji.

Protect your SME against cybercriminals in 5 easy steps

There are also viable solutions for small organizations to protect their IT infrastructure against cyber attacks.

Get to work with the 360° approach?

First read the IT security e-guide with useful tips and tricks from Proximus Accelerator SpearIT.

prevent

  • Protect your endpoints
  • Protect your network
  • Protect your data

detect

  • Monitoring
  • Log correlation
  • IT security reporting

respond

  • Analytics
  • Vulnerability patching
  • Incident response

Not every company has the capacity to organize a 360° approach. A cybersecurity partner who offers solutions such as managed services packages may be the answer.  A strong Managed Services Partner is ready for you.

Mounir Senhaji 

is an IT Security Consultant and DDoS Specialist at Proximus. For 20 years, he has followed emerging IT security technologies and the rapid development of cybercrime.

Service Excellence te bereiken door gespecialiseerde Security Intelligence en Service Intelligence oplossingen. In de huidige digitale wereld verwachten klanten dat hun gegevens uitermate veilig beheerd worden én wensen ze een snelle, vlekkeloze customer experience. Als Managed Services Provider biedt Davinsi Labs een portfolio aan oplossingen om Digital Service Excellence te realiseren voor de meest bedrijfskritische applicaties en services.

Proximus SpearIT is a Proximus Accelerator that helps IT departments in medium-sized companies that want to digitize their business further. They also lend support to organizations that do not have time to run their own IT organization. Proximus SpearIT offers a unique approach tailored to each company. IT services include IoT, IT security & networking, datacenter and cloud and IT for employees.

Proximus Accelerator Davinsi Labs works together with you

Step 1

Map the environment. What technologies does the company possess? How many and which users are there? What about servers and workstations? Where is the most critical business data? And so on.

Step 2

Collect and centralize company cybersecurity logs. In short, keep a security log that contains security-related information such as endpoints, network components, cloud services, VPN logs...

Step 3

Enable detection software to analyze the logs. This will help you discover patterns that indicate a potential attack.

Step 4

Follow up on the incidents that you have discovered from an analysis of the logs. Find out where they come from and which systems and accounts may have been compromised, as well as which valuable business data is at risk.

Step 5

Have operational security teams get to the root of the problem.

360° approach

IT security is therefore not a one-off task, but requires strategy and continuous monitoring and adjustment. So don't rush into it, but work out a complete security policy based on four aspects: Predict, Prevent, Detect and Respond.

Map out the IT security rules, how the monitoring will take place, who can respond to data breaches, and so on. With this 360° approach, you gain control over the IT security of your organization and achieve the best results.

predict

  • Risk prioritization
  • Anticipate threaths
  • Baseline systems & your IT security posture

Thimo De Souter 

is a Security Specialist, ethical hacker and Lead Developer of the Davinsi Labs DDoS simulator. He shares his cybersecurity expertise and his extensive experience with Davinsi Labs, one of the Proximus accelerators.

One magazine

Both large companies as well as SMEs face similar challenges of digitization. That is why we have joined forces and can now offer you an updated magazine: One, about smart entrepreneurship in a digital world.
Fullscreen