Skip to main content
  • nl
  • fr
  • de
  • en
Other information and services of the government: www.belgium.be
Logo

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation
Logo

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact

Save my organisation

  • Register my organisation
Skip to main content

NIS2, Are you in scope?

Belgium's new cybersecurity law enters into force. Check it out now.

Learn more

Are your accounts well protected?

Use Multi-Factor Authentication whenever possible.

Learn more

Breadcrumb

  1. Recent News, Guidelines and Reports

Recent News, Guidelines and Reports

21 Fri
Image
pexels-andrea-piacquadio-3769021.jpg
News

Surf without worries

Surf without worries is a series of simple and accessible online cybersecurity courses.

In the first part, Watch where you're going!, learn to recognize fake messages that arrive in our email inboxes and on our mobile phones.

20 Thu
Image
annotation_2023-07-24_145327.png
Guidelines

First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks

The risk of cyber attacks continues to rise. On average, there are 100 cyber attacks every day, an increase of 37% compared to 2019. Almost 70% of these attacks escape prosecution. Testimonies from companies that have been victims of cyber attacks show that they are often in the dark or improvising at the time of a cyber incident. Experts from the Federation of Enterprises in Belgium (FEB) and the Centre for Cybersecurity Belgium have therefore drawn up a roadmap in close collaboration with the business community and public authorities. A guide that accompanies companies from the moment they discover the incident until the situation is normalised.

19 Wed
Image
binary-958952_1920.jpg
Guidelines

My Vulnerability Testing Toolbox

If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions. This could result in compromising the confidentiality (e.g. private information leakage), the integrity (e.g. unauthorized modification of data), or the availability (e.g. website down) of resources.

18 Tue
Image
pexels-fauxels-3183197.jpg
Guidelines

Reporting Cyber Risk to Boards

Boards have a statutory duty to have proper risk oversight. Cyber risk constitutes by now a critical, potentially material, business risk. However, most Boards are ill-equipped to deal with cyber risks. They consider cyber as too technical, they merely approve resources and delegate the risk.

17 Mon
Image
onramp_dedicated-hosting-servers.jpg
Guidelines

Recommendations for anti-virus, EDR and XDR security solutions

This document provides guidance on generic, pragmatic and generic technical criteria and some relevant references for Antivirus, EDR and XDR  security solutions.

16 Sun
Image
pexels-fauxels-3183127.jpg
Guidelines

Crisis communication in the event of a cyber attack

The question is not "if" you will ever fall victim to a cyber attack, but "when". So you need to be prepared. Here are the recommendations for effective communication in the event of a cyber attack.

15 Sat
Image
cyber_at_work_1.jpg
Guidelines

How to quickly increase your organisation's cyber resilience?

It's not possible to prevent any and all cyber attacks, but there are things you can do. Cyber experts and security firms continue to insist that basic security actions can make a big difference, not only for individual internet users but also for companies and organizations: recognize and warn about phishing, use strong passwords and two-factor authentication (2FA), and patch and update systems in a timely manner.

14 Fri
Image
pexels-nataliya-vaitkevich-5122167.jpg
News

14 million clicks to suspicious websites avoided in Belgium thanks to unique Anti-Phishing Shield

By involving the general public, as many as 14 million clicks to suspicious websites were avoided in 2022. This equates to about 25 alerts to internet users per minute. If you know that Belgium has a population of 12 million, you understand that these are huge numbers.  This is the result of the Centre for Cybersecurity Belgium's Belgium Anti-Phishing Shield (BAPS), which alerts internet users to unsafe websites. This system is unique in Europe.

28 Wed
Image
batiment_2_0.jpg
News

Belgium puts even more weight in international fight against ransomware

Belgium has recently been officially represented in the International Counter Ransomware Task Force (ICRTF), a partnership between 25 countries and Interpol.  This is a new step for our country in the fight against ransomware. Thanks to the ICRTF, forces are joined across borders, knowledge is shared and joint actions are set up.  After all, no single country is able to combat ransomware effectively individually. This international partnership represents a major step forward. The Centre for Cybersecurity Belgium (CCB) is therefore very pleased to represent Belgium in the ICRTF.

28 Wed
Image
emergency.jpg
Guidelines

How to protect your organisation against a DDoS attack

A Distributed Denial of Service, or DDoS, is a cyber attack that impedes the normal data traffic of a particular service. It can have a major impact on the operations of organisations and businesses, so it is very important to protect yourself against this type of attack.  

Pagination

  • First page
  • Previous page ‹
  • Page 1
  • Page 2
  • Current page 3
  • Next page Next
  • Last page

Register your organisation

Register your organisation to access additional free CCB services and protect it from cyber threats.

Register my organisation
logo website

Make Belgium one of the least cyber-vulnerable countries in Europe together

Main navigation

  • Tools & Resources
  • Support
  • About us
  • Contact
© 2025   atwork.safeonweb.be   All Rights Reserved.

Footer privracy menu

  • Privacy Policy & Disclaimer
  • Terms of use

Our other websites:

cccb.be safeonweb.be