Skip to main content
  • nl
  • fr
  • de
  • en
Other information and services of the government: www.belgium.be Icon of www.belgium.be website
Logo
      • CyberFundamentals Framework
      • Self-Assessment
      • Policy Templates
      • Coordinated Vulnerability Disclosure Policy
      • News
      • Top Advice
      • Common Threats
      • NIS2 Quickstart Guide
      • The NIS2 Law
      • Regulations
    • Tools & Resources
      View all tools & resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation

Report an incident EN - Atwork

  • Report an incident
Logo

Main navigation

  • Tools & Resources
    • Tools
      • CyberFundamentals Framework
      • Self-Assessment
      • Policy Templates
      • Coordinated Vulnerability Disclosure Policy
    • Resources
      • News
      • Top Advice
      • Common Threats
    • Compliance
      • NIS2 Quickstart Guide
      • The NIS2 Law
      • Regulations
    • Tools & Resources
      View all tools & resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation

Report an incident EN - Atwork

  • Report an incident
Skip to main content

NIS2, Are you in scope?

Belgium's new cybersecurity law entered into force.

Learn more

Are your accounts well protected?

Use Multi-Factor Authentication whenever possible.

Learn more

Breadcrumb

  1. News

News

11 Fri
Image
ransomware-2320793_1920_2.jpg
Guidelines

Ransomware guide for small to medium sized organizations

In case of a ransomware attack, there are several steps that you can take to handle the incident efficiently. In this document we will give more information on how to respond to the incident and to help prevent this in the future.

Ransomware guide for small to medium sized organizations
25 Tue
Image
account_login_1.jpg
Guidelines

Protect accounts with multi-factor authentication (2FA/MFA)

Your password doesn't protect you like you think. Especially if someone can guess your password by looking at your social media. But let's say you have a complex password - or even a password manager - even then, cybercriminals still have ways to get behind your password. Once they are in possession of your data, you can kiss your money and possibly your identity goodbye.

So, what do you need? More than a password! A second method to verify your identity.

 

Protect accounts with multi-factor authentication (2FA/MFA)
24 Mon
Image
bait-1869897_1920_0.jpg
News

Belgium announces the end of phishing

Today, the Centre for Cybersecurity Belgium (CCB) and the Cyber Security Coalition are launching the Stay safe online initiative, a series of simple and accessible online training courses on cyber security. In the first part, "Look where you're going!”, people will learn to identify fake messages that they receive in their inboxes and on their mobile phones. In order to reach as many people as possible, the banking sector will also share this series en masse. If everyone learns to recognize fraudulent messages, Belgium can really announce the end of phishing.

Belgium announces the end of phishing
23 Sun
Image
binary-2450153_1920.jpg
Guidelines

How to respond to a ransomware attack in 12 steps

Organisations should assume that sooner or later they will be confronted with a ransomware attack. The main question is when. Preparation is key.

This is a guide about urgent actions to take when a ransomware has hit your company.

How to respond to a ransomware attack in 12 steps
22 Sat
Image
computer-phone-hands.jpg
Guidelines

How to keep control of your mobile devices?

In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of the corporate network as well as personal data.

How to keep control of your mobile devices?
21 Fri
Image
pexels-andrea-piacquadio-3769021.jpg
News

Surf without worries

Surf without worries is a series of simple and accessible online cybersecurity courses.

In the first part, Watch where you're going!, learn to recognize fake messages that arrive in our email inboxes and on our mobile phones.

Surf without worries
20 Thu
Image
annotation_2023-07-24_145327.png
Guidelines

First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks

The risk of cyber attacks continues to rise. On average, there are 100 cyber attacks every day, an increase of 37% compared to 2019. Almost 70% of these attacks escape prosecution. Testimonies from companies that have been victims of cyber attacks show that they are often in the dark or improvising at the time of a cyber incident. Experts from the Federation of Enterprises in Belgium (FEB) and the Centre for Cybersecurity Belgium have therefore drawn up a roadmap in close collaboration with the business community and public authorities. A guide that accompanies companies from the moment they discover the incident until the situation is normalised.

First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks
19 Wed
Image
binary-958952_1920.jpg
Guidelines

My Vulnerability Testing Toolbox

If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions. This could result in compromising the confidentiality (e.g. private information leakage), the integrity (e.g. unauthorized modification of data), or the availability (e.g. website down) of resources.

My Vulnerability Testing Toolbox
18 Tue
Image
pexels-fauxels-3183197.jpg
Guidelines

Reporting Cyber Risk to Boards

Boards have a statutory duty to have proper risk oversight. Cyber risk constitutes by now a critical, potentially material, business risk. However, most Boards are ill-equipped to deal with cyber risks. They consider cyber as too technical, they merely approve resources and delegate the risk.

Reporting Cyber Risk to Boards
17 Mon
Image
onramp_dedicated-hosting-servers.jpg
Guidelines

Recommendations for anti-virus, EDR and XDR security solutions

This document provides guidance on generic, pragmatic and generic technical criteria and some relevant references for Antivirus, EDR and XDR  security solutions.

Recommendations for anti-virus, EDR and XDR security solutions
16 Sun
Image
pexels-fauxels-3183127.jpg
Guidelines

Crisis communication in the event of a cyber attack

The question is not "if" you will ever fall victim to a cyber attack, but "when". So you need to be prepared. Here are the recommendations for effective communication in the event of a cyber attack.

Crisis communication in the event of a cyber attack
15 Sat
Image
cyber_at_work_1.jpg
Guidelines

How to quickly increase your organisation's cyber resilience?

It's not possible to prevent any and all cyber attacks, but there are things you can do. Cyber experts and security firms continue to insist that basic security actions can make a big difference, not only for individual internet users but also for companies and organizations: recognize and warn about phishing, use strong passwords and two-factor authentication (2FA), and patch and update systems in a timely manner.

How to quickly increase your organisation's cyber resilience?

Pagination

  • First page
  • Previous page ‹
  • Page 1
  • Page 2
  • Page 3
  • Current page 4
  • Page 5
  • Next page ›
  • Last page

Register your organisation

Register your organisation to access additional free CCB services and protect it from cyber threats.

Register my organisation
logo website

Make Belgium one of the least cyber-vulnerable countries in Europe together

Main nav - footer - Atwork

  • Tools & Resources
  • Support
  • About us
  • Contact
© 2025   atwork.safeonweb.be   All Rights Reserved.

Footer privracy menu

  • Privacy Policy
  • Accessibility Statement
  • Terms of use

Our other websites:

cccb.be safeonweb.be