Blog

The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT security for business.

Post-it met zwak wachtwoord op beeldscherm illustreert verouderd wachtwoordbeleid

Password policies for businesses: the basics many SMEs miss

The old password rules are outdated. Find out how modern policies with long password phrases,
IT-manager analyseert phishing simulatie resultaten op dashboard met dalend klikpercentage en stijgend meldpercentage

Interpreting phishing simulation results: what do the numbers really say?

How do you interpret your phishing simulation results? Benchmarks, the 5 metrics that matter and
Projectleider bekijkt cybersecurity-gevoelige bouwplannen op tablet op een Vlaamse bouwplaats

Cybersecurity for the construction industry: why contractors and developers are a target

Construction companies are a top target for invoice fraud and ransomware. Discover 5 concrete measures
Cybersecurity consultant presenteert audit-rapport aan directieteam van Vlaamse KMO

Cybersecurity for SMEs: where to start with a limited budget

Where does a Flemish SME start with cybersecurity? Roadmap in 5 phases, budget indications and
Industriële netwerkaansluiting wordt getest tijdens OT-pentest bij Vlaamse producent

OT pen testing: how to securely test operational technology for vulnerabilities

What is an OT pentest and how do you safely test PLCs and SCADA? Discover
IT-beveiligingsteam bespreekt AI-phishing dreigingen op groot scherm in vergaderruimte in Belgisch kantoor

AI-driven phishing: why traditional protection is no longer enough

AI generates error-free phishing emails that bypass your filters. Find out what defenses do work
NIS2 cybersecurity voor Belgische ziekenhuizen: digitale bescherming van patiëntdata en zorgsystemen

Cybersecurity for the healthcare industry: what NIS2 means for hospitals, pharmacies and healthcare groups

What does NIS2 mean for Belgian healthcare institutions? Deadlines, notification requirements, medical IoT and subsidies
Cybersecurity auditor en IT-manager bespreken auditvoorbereiding bij een dashboard in een kantoor

Preparing for cybersecurity audit: the checklist for a smooth audit

Prepare your cybersecurity audit with this checklist. Find out what documents, stakeholders and steps are
Team van professionals tijdens een threat modeling workshop met gekleurde post-its en systeemdiagram

Threat modeling: this is how you map cyber threats before they strike

What is threat modeling and why is it essential in 2026? Discover the frameworks, the