Skip to main content
  • nl
  • fr
  • de
  • en
Other information and services of the government: www.belgium.be
Logo

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation
Logo

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation
Skip to main content

NIS2, Are you in scope?

Belgium's new cybersecurity law entered into force.

Learn more

Are your accounts well protected?

Use Multi-Factor Authentication whenever possible.

Learn more

Breadcrumb

  1. News

News

16 Thu
Image
cyber_at_work.jpg
Guidelines

CCB’s Cyber Tips: How to mitigate security risks for Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is a protocol that allows users to access and control computers remotely. While it offers user-friendly flexibility, it also introduces significant security risks to your organization's attack surface. Many attackers use RDP to gain access into a network and exfiltrate stolen data.

To better protect yourself, the Centre for Cybersecurity Belgium (CCB) compiled a list of recommendations and step-by-step tutorials.

16 Fri
Image
adult-american-blond-1061580.jpg
Guidelines

Tech: DDoS Protection and Prevention - Technical Guideline 2024

A Denial of Service (DOS) attack is a cyber-attack that targets the normal traffic of a particular service. In a Distributed Denial of Service (DDoS) attack, a network website is overloaded by a botnet that simultaneously sends requests to the victim. The result may be that the availability of a particular service can no longer be guaranteed. The service is then unavailable for a period of time. There are several types of DDoS attacks.

11 Fri
Image
ransomware-2320793_1920_2.jpg
Guidelines

Ransomware guide for small to medium sized organizations

In case of a ransomware attack, there are several steps that you can take to handle the incident efficiently. In this document we will give more information on how to respond to the incident and to help prevent this in the future.

25 Tue
Image
account_login_1.jpg
Guidelines

Protect accounts with multi-factor authentication

Your password doesn't protect you like you think. Especially if someone can guess your password by looking at your social media. But let's say you have a complex password - or even a password manager - even then, cybercriminals still have ways to get behind your password. Once they are in possession of your data, you can kiss your money and possibly your identity goodbye.

So, what do you need? More than a password! A second method to verify your identity.

 

24 Mon
Image
bait-1869897_1920_0.jpg
News

Belgium announces the end of phishing

Today, the Centre for Cybersecurity Belgium (CCB) and the Cyber Security Coalition are launching the Stay safe online initiative, a series of simple and accessible online training courses on cyber security. In the first part, "Look where you're going!”, people will learn to identify fake messages that they receive in their inboxes and on their mobile phones. In order to reach as many people as possible, the banking sector will also share this series en masse. If everyone learns to recognize fraudulent messages, Belgium can really announce the end of phishing.

23 Sun
Image
binary-2450153_1920.jpg
Guidelines

How to respond to a ransomware attack in 12 steps

Organisations should assume that sooner or later they will be confronted with a ransomware attack. The main question is when. Preparation is key.

This is a guide about urgent actions to take when a ransomware has hit your company.

22 Sat
Image
computer-phone-hands.jpg
Guidelines

How to keep control of your mobile devices?

In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of the corporate network as well as personal data.

21 Fri
Image
pexels-andrea-piacquadio-3769021.jpg
News

Surf without worries

Surf without worries is a series of simple and accessible online cybersecurity courses.

In the first part, Watch where you're going!, learn to recognize fake messages that arrive in our email inboxes and on our mobile phones.

20 Thu
Image
annotation_2023-07-24_145327.png
Guidelines

First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks

The risk of cyber attacks continues to rise. On average, there are 100 cyber attacks every day, an increase of 37% compared to 2019. Almost 70% of these attacks escape prosecution. Testimonies from companies that have been victims of cyber attacks show that they are often in the dark or improvising at the time of a cyber incident. Experts from the Federation of Enterprises in Belgium (FEB) and the Centre for Cybersecurity Belgium have therefore drawn up a roadmap in close collaboration with the business community and public authorities. A guide that accompanies companies from the moment they discover the incident until the situation is normalised.

19 Wed
Image
binary-958952_1920.jpg
Guidelines

My Vulnerability Testing Toolbox

If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions. This could result in compromising the confidentiality (e.g. private information leakage), the integrity (e.g. unauthorized modification of data), or the availability (e.g. website down) of resources.

18 Tue
Image
pexels-fauxels-3183197.jpg
Guidelines

Reporting Cyber Risk to Boards

Boards have a statutory duty to have proper risk oversight. Cyber risk constitutes by now a critical, potentially material, business risk. However, most Boards are ill-equipped to deal with cyber risks. They consider cyber as too technical, they merely approve resources and delegate the risk.

17 Mon
Image
onramp_dedicated-hosting-servers.jpg
Guidelines

Recommendations for anti-virus, EDR and XDR security solutions

This document provides guidance on generic, pragmatic and generic technical criteria and some relevant references for Antivirus, EDR and XDR  security solutions.

Pagination

  • First page
  • Previous page ‹
  • Page 1
  • Page 2
  • Current page 3
  • Page 4
  • Next page ›
  • Last page

Register your organisation

Register your organisation to access additional free CCB services and protect it from cyber threats.

Register my organisation
logo website

Make Belgium one of the least cyber-vulnerable countries in Europe together

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact
© 2025   atwork.safeonweb.be   All Rights Reserved.

Footer privracy menu

  • Privacy Policy

Our other websites:

cccb.be safeonweb.be