Cegeka Careers Language Why Cegeka Back
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions Back
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services Back
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries Back
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

All industries
Website_Navigation_Agri_and_Food

Agri & Food

Cegeka has a deep understanding of the agri and food ecosystem and the opportunities it creates.

Website_Navigation_Healthcare

Healthcare

By creating leading digital solutions and connecting individuals, processes and systems.​

Energy & Utilities

Energy & Utilities

The arrival of smart electricity grids will allow companies to take care of their own energy management

Finance & Insurance

Finance & Insurance

Take major steps towards cloud computing to increase effectiveness through the use of AI and big data.

Manufacturing

Manufacturing

Production chains are becoming intelligent networks with real-time track-and-trace systems.

Website_Navigation_Mobility

Mobility

Offer citizens, businesses and visitors a better experience by integrating the best digital solutions for mobility.

Insights Back
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Back
Select language

English

Corporate (English)

Austria (German)

Belgium (Dutch)

Belgium (French)

Denmark (English)

Germany (German)

Greece (Greek)

Italy (Italian)

Romania (English)

Sweden (English)

The Netherlands (Dutch)

United Kingdom (English)

Let’s get in touch
Cegeka Why Cegeka
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

All industries
Website_Navigation_Agri_and_Food

Agri & Food

Cegeka has a deep understanding of the agri and food ecosystem and the opportunities it creates.

Website_Navigation_Healthcare

Healthcare

By creating leading digital solutions and connecting individuals, processes and systems.​

Energy & Utilities

Energy & Utilities

The arrival of smart electricity grids will allow companies to take care of their own energy management

Finance & Insurance

Finance & Insurance

Take major steps towards cloud computing to increase effectiveness through the use of AI and big data.

Manufacturing

Manufacturing

Production chains are becoming intelligent networks with real-time track-and-trace systems.

Website_Navigation_Mobility

Mobility

Offer citizens, businesses and visitors a better experience by integrating the best digital solutions for mobility.

Insights
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Corporate (English) Austria (German) Belgium (Dutch) Belgium (French) Denmark (English) Germany (German) Greece (Greek) Italy (Italian) Romania (English) Sweden (English) The Netherlands (Dutch) United Kingdom (English) Careers Let’s get in touch
Home Discover our latest blogs Discover our latest blogs Boosting Cyber Resilience: Strategies for Tackling Modern Threats
Cyber security & Networking
4 minutes reading

Boosting Cyber Resilience: Strategies for Tackling Modern Threats

Security should always support the business. The first question is what is important to organisations. What do you definitely want to protect? Random investment in security solutions is not an efficient use of financial resources. The Return On Security Investment (ROSI) has to be right.

Bart Van den Branden

Bart Van den Branden

March 09, 2022

For that reason, it’s best to first think about what keeps an organisation running, and to build the security strategy around that. You then make the investments which will protect your organisation’s most important assets. These are usually the ones that will cost you the most if there is a breach. Is it your database? Your webstore? Your factory? It’s different for each organisation, but we do notice four trends.

Trend 1: EDR against advanced cyberattacks

Cyberattacks are become increasingly advanced. It is taking much longer for a breach to be detected. In this challenging context, your main priority is that your business keeps running. You therefore need to prevent your devices being entered by cybercriminals or infected with malware.

Classic proxies or firewalls, for example, form a first line of defence. But if you restrict your protection to these solutions, it will give you a false sense of security. After all, such software will stop a lot of attacks, but the protection is never 100%. These solutions attempt to prevent breaches, but they lack the functionality to detect.

You have to assume that your IT systems will be breached at some time. And what do you do then? You need a second line of defence to detect when an attack breaks through the first line. That is Endpoint Detection & Response (EDR).

For EDR, you install an agent on each device (computer, telephone, tablet) to detect breaches on that device. This process happens in an intelligent way. The agent monitors the behaviours of the user and the programs on the device. If anything abnormal happens, the agent sounds the alarm.

As soon as malware or a cybercriminal breaks through the first line of defence, the EDR’s work begins. Because it continuously monitors all actions on the device, there are various moments during the breach when EDR can sound the alarm. For example, at the moment when the malware is first executed, the moment when the malware tries to save itself to the device, or the moment when it tries to acquire more rights.

EDR doesn’t only use learning processes (machine learning) to recognise suspicious behaviour. The technology can also fall back on cyber threat intelligence: all kinds of external information about attacks in other organisations. In that way, an agent in your device can sound the alarm if it detects behaviour that has already been identified as dangerous somewhere else.

Endpoint Detection and Response (EDR) against advanced cyberattacks

Trend 2: NDR to regain control

Due to COVID-19, working at home has drastically increased, and with it the amount of network traffic. And we are making increasing use of IoT devices or SaaS applications, over which we have less control. You cannot install an EDR agent on these.

For this, Network Detection & Response (NDR) offers an additional layer of protection, on top of a firewall for example. With NDR, you control what is communicated between devices rather than what happens on those devices. NDR analyses the network traffic for suspicious patterns. Because the control is exercised passively, the impact of this protection layer on the business is also limited.

Even if the network traffic is encrypted, such an analysis provides useful information. For example, a sudden increase in encrypted traffic to an unknown server can indicate a malware infection.

If NDR then detects suspicious network traffic, it can instruct a firewall to block communication with the device or server.

Trend 3: Brand intelligence for insight into the cyber underworld

For good protection, it’s no longer enough to look at what is happening in your own infrastructure. After all, the cyber underworld is expanding all the time. You don’t have the time to monitor all that yourself. If, for example, you have already had an unnoticed cyber breach, there is a likelihood that the stolen data is being offered on the dark web. Can you monitor that?

Also, you would want to know as quickly as possible if someone registered a domain name that closely resembled that of your organisation. After all, there is a good chance that the domain name will be used in a phishing campaign to trick your users or customers.

The same applies if a false mobile app from your organisation appears in the Apple or Google app stores. The faster you detect this, the faster you can prevent an attack using it.

We call this analysis of what is happening outside our own infrastructure brand intelligence. It is an essential supplement to EDR and NDR for the protection of your organisation.

Trend 4: XDR for a holistic and customised approach to your organisation’s security

EDR, NDR and brand intelligence each resolve individual problems, but security is a multi-dimensional problem. You can never deal with that fully using partial solutions, each of which operates in isolation. You need a holistic approach to security.

A solution that handles security as a whole is eXtended Detection and Response (XDR). As well as EDR, NDR and brand intelligence, XDR uses SIEM and SOAR:

  • SIEM (Security Information and Event Management) collects logs from all kinds of sources (servers, applications, network devices etc.), correlates that data, and delivers realtime analysis and notifications of suspicious events.
  • SOAR (Security Orchestration, Automation and Response) is a system that responds automatically to incidents identified by EDR, NDR, brand intelligence and SIEM. In this way, it flexibly connects the various partial solutions to create a customised solution for your organisation’s specific problems. If, for example, you get brand intelligence about a phishing site, you can automatically block all communication to that website.

With XDR, the task of the SOC (Security Operations Center) also changes. A modern SOC team consists not only of analysts who monitor threats to your IT infrastructure, but also of SOC engineers who automate your security tasks in SOAR playbooks.

Conclusion

Your organisation will never be 100% protected, and your budgets are not bottomless. However, with a continuous process for improvement and a focus on Return On Security Investment, your organisation will become a bit more secure with each day. We call this cyber resilience. When you are cyber resilient, you give proportionate attention to the four components of the continuous security process:

  • Assess: Understanding your risks.
  • Prevent: Preventing attacks insofar as possible.
  • Detect & respond: Detecting when, despite all efforts, there is a breach, and respond to it.
  • Recover: Recovering quickly and efficiently from a breach.

Become cyber resilient and protect your organisation against the latest trends in cybercrime

In this way, you can protect your organisation against the latest trends in cybercrime.

Bart Van den Branden

Bart Van den Branden

More of Bart Van den Branden articles

Get in touch