Cyber resilience vraagt om meer dan back-up: wat de hernieuwde samenwerking tussen NetApp en Commvault betekent voor organisaties
Geplaatst op: 17 April 2026

De samenwerking tussen NetApp en Commvault bestaat al langer, maar krijgt nu opnieuw extra kracht. Met hun hernieuwde gezamenlijke focus op cyber resilience laten beide partijen zien waar het vandaag echt om draait: niet alleen data veilig opslaan, maar ook dreigingen sneller signaleren en systemen gecontroleerd kunnen herstellen wanneer het misgaat.
NetApp en Commvault zetten met deze versterkte samenwerking nadrukkelijk in op een geïntegreerde aanpak voor enterprise data protection en cyber resilience in hybride omgevingen. Daarbij combineren ze NetApp’s data-infrastructuur en AI-gedreven ransomwaredetectie met de resilience-, protection- en recovery-capaciteiten van Commvault.
Voor organisaties is dat een relevante ontwikkeling. De impact van cyberincidenten wordt namelijk niet alleen bepaald door óf je een back-up hebt, maar vooral door hoe snel je afwijkingen herkent, hoe goed je kritieke data is afgeschermd en hoe betrouwbaar je kunt herstellen zonder onnodige verstoring van de bedrijfsvoering. In dat opzicht verschuift de aandacht steeds meer van alleen beschikbaarheid naar aantoonbare weerbaarheid.
Waarom alleen back-up niet meer voldoende is
Back-up blijft een essentieel onderdeel van een moderne IT-strategie, maar het is niet langer voldoende als enige maatregel. In hybride IT-landschappen zijn data, applicaties en workloads verspreid over on-premises omgevingen, private cloud en public cloud. Dat maakt de afhankelijkheden groter en hersteltrajecten complexer. Wanneer een organisatie pas tijdens een incident ontdekt welke data kritiek is, waar kwetsbaarheden zitten of hoe recovery precies moet verlopen, gaat kostbare tijd verloren.
Juist daarom is cyber resilience breder dan traditionele back-up. Het gaat om het totaalplaatje: preventie, detectie, bescherming, governance en herstel. De hernieuwde verdieping in de samenwerking tussen NetApp en Commvault sluit daar direct op aan, doordat beide partijen inzetten op een end-to-end benadering van databescherming en recovery.
Wat deze samenwerking concreet toevoegt
De kracht van deze samenwerking zit in de combinatie van infrastructuur en herstel. NetApp brengt een enterprise dataplatform met ingebouwde intelligentie en AI-gedreven ransomwaredetectie in. Commvault voegt daar oplossingen aan toe voor resilience, bescherming en recovery op enterprise-schaal. Samen moet dat leiden tot sneller herstel, betere beheersing van risico’s en meer grip op bedrijfskritische data.
Dat is belangrijk, omdat cyber resilience in de praktijk vaak stukloopt op versnippering. Veel organisaties hebben wel tooling voor opslag, losse securitymaatregelen en back-upvoorzieningen, maar missen samenhang. Daardoor ontstaan blinde vlekken tussen IT-beheer, security-operaties en recoveryprocessen. Een geïntegreerde aanpak helpt om die losse onderdelen beter op elkaar te laten aansluiten.
De vertaalslag naar de praktijk
Voor organisaties draait het uiteindelijk niet om de technologie op zichzelf, maar om de vraag: zijn wij in staat om onder druk te blijven functioneren? Dat vraagt om heldere keuzes in drie gebieden.
Allereerst is er de datafundering. Organisaties moeten weten welke data bedrijfskritisch is, waar die zich bevindt, hoe die wordt beschermd en welke afhankelijkheden er zijn met applicaties en infrastructuur. Zonder die basis blijft cyber resilience reactief.
Daarnaast is er cyberweerbaarheid. Dat betekent niet alleen bescherming tegen dreigingen, maar ook het inrichten van processen, verantwoordelijkheden en controles die ervoor zorgen dat afwijkingen tijdig worden gesignaleerd en er adequaat gehandeld kan worden.
Tot slot is er herstelbaarheid. Niet alleen de vraag of data teruggezet kan worden, maar ook hoe snel, gecontroleerd en betrouwbaar dat gebeurt. Een recoveryplan moet in de praktijk uitvoerbaar zijn, ook als de druk hoog is en meerdere systemen geraakt zijn.
Waar Idaita en OpenSight elkaar versterken
Juist op dat punt komt de samenwerking tussen Idaita en OpenSight logisch samen.
Idaita helpt organisaties bij het bouwen van een sterke en toekomstbestendige datafundering. Door data, infrastructuur en cloud slim in te richten, ontstaat de basis die nodig is om systemen beschikbaar, beheersbaar en herstelbaar te houden.
OpenSight versterkt die basis met een duidelijke focus op cyberweerbaarheid en herstel. Daarbij gaat het niet alleen om technologie, maar ook om de processen, verantwoordelijkheden en keuzes die nodig zijn om als organisatie veerkrachtig te blijven bij dreigingen of incidenten.
Samen ontstaat daarmee een aanpak waarin data, infrastructuur, processen en security niet los van elkaar worden bekeken, maar als onderdelen van één weerbare keten. En juist die samenhang is essentieel voor organisaties die cyber resilience structureel willen versterken.
Van technologiekeuze naar continuïteitsvraagstuk
De versterkte samenwerking tussen NetApp en Commvault is daarom meer dan alleen technologienieuws. Het onderstreept een bredere ontwikkeling in de markt: cyber resilience wordt steeds minder gezien als een technisch deelonderwerp en steeds meer als een continuïteitsvraagstuk. Bestuurders en IT-teams willen niet alleen weten welke oplossing er draait, maar vooral of de organisatie bestand is tegen verstoring en hoe snel de impact kan worden beperkt wanneer zich een incident voordoet.
Voor veel organisaties ligt daar nog werk. Niet omdat er helemaal geen maatregelen zijn, maar omdat de samenhang ontbreekt tussen dataopslag, detectie, beveiliging, recovery en operationele besluitvorming. Juist daar zit de waarde van een integrale benadering.
Tot slot
De hernieuwde verdieping in de samenwerking tussen NetApp en Commvault bevestigt een beweging die al langer zichtbaar is: cyber resilience vraagt om meer dan alleen back-up. Het vraagt om een slimme combinatie van datamanagement, beveiliging, detectie en herstel, ingebed in de dagelijkse realiteit van de organisatie.
Met Idaita als partner voor een sterke datafundering en OpenSight voor cyberweerbaarheid en herstel, helpen we organisaties om beschikbaar, beschermd en herstelbaar te blijven. Want alleen wanneer die drie samenkomen, ontstaat de veerkracht die nodig is om met vertrouwen te blijven ondernemen en innoveren.
CrowdStrike Global Threat Report: The year of the “evasive adversary”
Geplaatst op: 27 March 2026

In 2025, attackers became faster, smarter, and above all, less visible. The CrowdStrike 2026 Global Threat Report paints a threat landscape in which adversaries are increasingly exploiting trust: legitimate accounts, trusted cloud services, SaaS integrations, and software supply chains. The result is a type of attack that is difficult to distinguish from normal activity—with an impact that can materialize in minutes.
At the same time, 2025 is the year in which AI adversaries truly ramped up their activities. AI has enabled the acceleration of phishing, the automation of reconnaissance, and the “troubleshooting” of attack techniques. And it doesn’t stop there: AI systems themselves are becoming a new target and part of the attack surface
Key findings from the 2025 report
- Attacks are happening faster than ever
The average ‘breakout time’ (the time between initial access and lateral movement) dropped to 29 minutes in 2025. This is a 65% increase in speed compared to 2024. CrowdStrike’s fastest observed breakout took just 27 seconds. - A growing number of intrusions are malware-free
In 2025, 82% of detections were malware-free. Attackers use valid credentials, admin tools and ‘living off the land’ techniques to avoid detection. - AI accelerates and democratizes attack capabilities
CrowdStrike observed an 89% year-over-year increase in attacks by AI-enabled adversaries. AI not only increases the scale of attacks but also empowers less sophisticated actors to carry out operations that previously required greater expertise. - Cloud and identity are at the center of attention
Cloud-related intrusions increased by 37% in 2025. Among state-affiliated actors, this figure was as high as 266%. Furthermore, valid account abuse accounted for 35% of cloud-related incidents, clearly indicating that identity is the main battleground. - Zero-day exploits and edge devices are narrowing the defense window
The number of zero-day exploits prior to public disclosure increased by 42%. In 2025, activity linked to China surged by 38%, and in 67% of the vulnerabilities they exploited, the flaw provided direct system access. Furthermore, 40% of these exploits targeted internet-facing edge devices, such as VPNs, firewalls and gateways. - The blast radius is being expanded by supply chain attacks
Attackers are increasingly compromising ‘upstream’ organizations, such as software vendors, repositories and CI/CD, in order to impact downstream organizations at scale. The report describes, among other things, the largest reported crypto theft ever: $1.46 billion, made possible through a supply chain compromise.
Manufacturing companies increasingly targeted
Attacks on industrial organizations and their supply chains led to disruptions in production processes. The speed at which attackers can move within networks makes strict separation between IT and OT, as well as clear chain agreements, essential.

What does this mean for organizations?
The common thread is clear: trust has become the new attack vector. Attackers move through authorized channels (identity, SaaS, cloud, and supply chain) and avoid heavily monitored endpoints. This creates blind spots precisely where business processes depend most on continuity.
In this context, ‘reactive’ defense is becoming increasingly ineffective. When exfiltration can begin in minutes and a breakout can occur in seconds, the speed of detection, decision-making and response is crucial. Ideally, this would be supported by automation and cross-domain correlation.
Recommended measures (based on the recommendations in the report)
- Secure AI: Protect AI Systems as well as AI Usage
- Ensure that AI governance and monitoring align with how employees use AI tools.
- Implement access controls and data classification to minimize data breaches.
- Protect your AI workloads against runtime attacks, such as prompt injection.
- Evaluate the suppliers and supply chains involved in the development and integration of AI.
- Treat identity and SaaS as primary attack surfaces
- Implement phishing-resistant MFA wherever possible.
- Enforce the principle of least privilege for service accounts and non-human identities as well.
- Monitor anomalous token and SaaS activity (OAuth, sessions, API keys).
- Eliminate cross-domain blind spots
- Consolidate telemetry across endpoints, the cloud, identity, SaaS, and the network.
- Cross-domain correlation and detection (XDR + next-gen SIEM workflows).
- Automate data enrichment with threat intelligence to identify attack paths more quickly.
- Secure the software supply chain and developer workflows
- Harden developer endpoints en CI/CD.
- Validate dependencies and package integrity (scanning, signing, policy).
- Conduct third-party risk assessments on tools and suppliers.
- Prioritize the patching and monitoring of edge devices
- Triage en patch internet-facing systemen versneld (streef naar uren/dagen, niet weken)
- Accelerate the triage and patching of internet-facing systems, aiming for hours or days rather than weeks.
- Segment to limit lateral movement from the perimeter
In short
2025 showed us that the most successful attacks are not necessarily the ‘newest’ ones, but rather those that are faster, smarter and better concealed through identity, the cloud, SaaS and supply chains. In 2026, the organization that will make a difference are those that organize their defenses to be just as cross-domain and agile as their adversaries’ operations.
Would you like to discuss what these insights mean for your organization (identity, SaaS, cloud, and edge)? Contact OpenSight for a tailored risk analysis and concrete steps for improvement.
Cybersecurity Awareness: Why a stand-alone training course is never enough
Geplaatst op: 13 October 2025

The digital threats that businesses face today are greater and more varied than ever before. Hackers are constantly developing new methods, from sophisticated phishing campaigns and ransomware to deepfake attacks and social engineering. The question is no longer whether your organization will be attacked, but when.
Although technical measures such as firewalls and antivirus software are important, they are only part of the solution. Cybercriminals are increasingly targeting the human factor: employees who click on the wrong link or respond to a suspicious request.
That’s why cybersecurity awareness is essential!
What does cybersecurity awareness mean?
Cyber awareness goes far beyond simply knowing that ‘hackers exist’. It is about developing a security-conscious workplace culture, in which employees:
- Recognize and understand risks (phishing, malware, social engineering).
- Know how to act safely in everyday situations.
- Staying alert even when the workload is high or the attack is subtly packaged.
Awareness is therefore not a one-off training course or checklist, but an ongoing process of learning and application.
The dangers of not paying attention to cybersecurity
Many organizations still underestimate the impact of untrained employees. Some facts:
- Human error accounts for 74% of all data breaches (according to recent security reports).
- Phishing remains the most popular method of attack: a single click can grant access to entire corporate networks.
- The financial damage caused by a single incident can quickly amount to tens of thousands of euros, not to mention the potential reputational damage and fines under the GDPR.
As you can see, even the strongest IT environment can be undermined by a single inattentive employee.
Why one cyber security awareness training is not enough
Many companies invest in an annual e-learning or one-off workshop. The problem?
- Information fades quickly without repetition.
- Cyber threats are constantly evolving, so what was relevant last year is now obsolete.
- Employees become less alert when there are no regular triggers.
Awareness only works if it is part of the company’s DNA: short, relevant and repeated training, supplemented with practical simulations such as phishing tests.

What does ongoing awareness look like?
A successful program consists of several layers:
- Regular micro-learnings: short training sessions linked to current threats.
- Simulations: such as phishing tests to see how employees react in practice.
- Campaigns: posters, videos and internal communications that keep the theme alive.
- Measure and improve: insight into click behavior, awareness scores and areas for improvement.
This makes awareness a cyclical process rather than an annual tick-box exercise.
The role of OpenSight and KnowBe4
At OpenSight, we believe that an organization can only be truly secure if people are part of the defence. That is why we work together with KnowBe4, the global market leader in security awareness.
What makes this approach unique?
- Access to a library full of training content, available in multiple languages and styles.
- Gamification and campaigns that really appeal to employees (like this year’s 80s arcade theme).
- Reports and metrics that show where risks lie and how they are reduced through training.
With this combination, we make security awareness fun, understandable and effective.
Cybersecurity Awareness Month
October is Cybersecurity Awareness Month worldwide. We are seizing this opportunity to raise awareness among organizations concerning the role their employees play. In collaboration with KnowBe4, OpenSight is organizing a free webinar in which we will take a closer look at:
- How to create support among management and employees.
- The latest cyber threats and how criminals operate.
- Practical ways to improve awareness structurally.
Cybersecurity is never “done”
As cybercrime never stops, neither can cybersecurity awareness. A one-off training course can create a false sense of security. In contrast, continuous programs build a human firewall that keeps pace with the times.
Would you like to know how you can achieve this in your organisation?
Register for our webinar during Cybersecurity Awareness Month and discover how you can structurally embed awareness in your corporate culture.
Cyber Security Trends for 2024: Why Zero Trust and AI Keep Your Business Safe
Geplaatst op: 12 September 2024

It’s no secret that the world of cybersecurity is constantly evolving. Businesses face new challenges and threats daily, making it essential to stay updated with the latest trends. Two technologies dominating the conversation this year are Zero Trust and Artificial Intelligence (AI). But what do they really mean for your business? Let’s take a closer look at these trends and what they could mean for you.
The transition to Zero Trust
When we talk about Zero Trust, we’re not just referring to a new tool or buzzword. It represents a fundamental shift in how we approach security. The traditional model, where companies relied on perimeter-based security, has seen its day. This approach, which was once enough to keep threats out, now falls short in the era of cloud computing and remote work.
Why is Zero Trust so important?
- Security for a decentralized world: In an era where employees can work from anywhere at any time, it’s crucial to ensure they have secure access to the resources they need, without the risk of unauthorized access.
- Protection against internal threats: Not all threats come from the outside. Sometimes internal actors, whether intentional or not, pose a significant risk. Zero Trust ensures that no one, not even internal users, has access to more than they need.
- Flexibility and scalability: As businesses grow and evolve, Zero Trust offers a flexible approach that can easily be adapted to changing business needs.
The impact of AI on security
AI is not just a buzzword in the world of cybersecurity; it’s a game-changer. Traditional security systems are often reactive, meaning they respond only once an attack is already underway. AI changes this by enabling a proactive approach, where threats are detected and neutralized before they can strike.

How does AI make a difference?
- Forward-thinking with predictive analytics: Imagine being able to predict where the next attack will come from. AI makes this possible by analyzing patterns in data and identifying potential threats before they occur.
- Faster response times: When an attack occurs, time is of the essence. AI can respond instantly, neutralize threats, and prevent further damage.
- Integration with existing systems: AI does not work in isolation. It is increasingly integrated with existing security systems, creating a seamless defense that is both broad and deep.
What do these trends mean for your business?
For businesses, the integration of Zero Trust and AI brings several tangible benefits. Firstly, it means better protection against today’s increasingly complex threats. But it also means that your company can respond more flexibly to changes in the market and technology.
Take, for example, a company that is rapidly growing and hiring new employees. With a traditional security approach, it could take months to securely onboard everyone onto the right systems. However, with Zero Trust and AI, this process can be much faster and more secure.
Additionally, AI gives you the ability to identify threats that you might otherwise overlook. This means you’re not only protecting your data but also safeguarding your reputation and business continuity.
In short…
Zero Trust and AI are essential tools for businesses that want to survive and thrive in an ever-changing digital world. By embracing these technologies, you can ensure that your company remains secure and is also prepared for the challenges of tomorrow. It’s time to think about the future of your business security and take the necessary steps to secure that future.
Developing an ISO 27001-compliant integrated framework for internal controls
Geplaatst op: 12 April 2024

For organizations striving for ISO 27001 certification, developing and implementing an integrated internal framework is a crucial step. This framework ensures that internal controls are seamlessly integrated into daily business processes, making them an essential part of the organization’s normal operations. But how do you tackle this and integrate existing control mechanisms?
What is an integrated framework for internal controls?
Let’s first define what we mean by an integrated framework for internal controls, before going into the integration of existing controls. This is basically a set of controls that are implemented in the business processes, incorporating them as an essential part of the daily activities of the organization.
Main frameworks for information security
Several frameworks are available to help organizations integrate controls. Some well-known examples are COSO, COBIT and ISO/IEC 27001. These frameworks provide guidance on identifying, implementing and maintaining effective internal control measures.
Approach to setting up an ISO 27001 framework
The approach to setting up an ISO 27001 framework largely follows the principles of COSO, with a strong focus on risk assessment and implementing policies, procedures and control activities. ISO 27001 certification focuses not only on implemented controls, but also on setting up an information security management system (ISMS).
Integration of existing control frameworks
For organizations that already have control frameworks in place, it’s important to integrate this framework with the requirements of ISO 27001. Full utilization of the existing framework is strongly recommended, as it minimizes effort and facilitates management acceptance.
Approach to integration
Make the most of what is already implemented in your organization
It is essential to make full use of the existing frameworks. It would be a shame to ignore the investments in the current control framework. It is advisable to use the ISO 27001 Annex A control set as a guide, considering all relevant controls and implementing them if applicable. Appropriate Governance Risk and Compliance tooling can also help you in putting the initial structure in place. This simplifies the performance, monitoring and reporting of control tasks and ensures unambiguous communication on controls.
Do a mapping based on a GAP analysis
By comparing the existing control framework with the ISO 27001 control set at the control test/supervisory level, GAPs can be identified. This simplifies the process of aligning existing controls with the ISO 27001 control set.
Filling in following your GAP analysis
Where the existing framework shows GAPs against the ISO 27001 control set, new controls should be defined and implemented. The aim is to ensure that all risks are adequately addressed by the control framework, this supports the functioning of the ISMS.
Management buy-in and the benefits of integration
Keeping the existing framework simplifies management acceptance and facilitates the integration of controls into business processes. Moreover, a GAP analysis at the internal testing/supervisory levels helps identify gaps in the information security policy and ISMS, enabling continuous improvement.
In conclusion, developing an ISO 27001-compliant integrated internal controls framework is a crucial step for organizations striving to achieve a high level of information security and certification in line with international standards. By integrating existing control frameworks and continuously striving for improvement, organizations can build a solid foundation for effective information security and risk management.
Need more information or help developing an ISO 27001-compliant integrated framework for internal controls?
Then contact us, no commitment necessary. At OpenSight, we are happy to help!
Identity and access management: who’s that and what is he doing here?
Geplaatst op: 26 February 2024

In today’s highly connected world, businesses increasingly rely on technology and data. This dependency has increased the threat of cyber attacks and data theft. ‘Identity and Access Management’ (IAM) is a crucial approach to prevent such security incidents. This blog explores the fundamentals of IAM and highlights its importance in the context of cyber security.
What is identity- and access management?
Identity and Access Management (IAM) concerns managing digital identities and regulating access to resources within an organization’s network. It ensures that authorized persons have access to relevant information at the right time, while unauthorized users are prevented from reaching sensitive data. IAM comprises several components, including authentication, authorization and user management.
The identity and access management process, or IAM process, includes the following steps:
- Identity provisioning: The first phase of the IAM process involves the creation of digital identities for employees, partners and customers. This involves collecting data such as a name, e-mail address, function and role.
- Authentication: Next, user identity is verified through mechanisms such as passwords, biometrics or multi-factor authentication (MFA).
- Authorization: After identity verification, access to resources is granted based on the user’s role and responsibilities within the organization. In this phase, users are granted permissions and privileges.
- Monitoring and reporting: The final stage of the IAM process involves monitoring user activity and generating reports on access and usage. This step detects possible anomalies or suspicious activity that may indicate a security breach.
The importance of identity- and access management in cyber security
IAM plays a vital role in ensuring the security of an organization’s network and data. Some of the reasons why IAM is vital for cyber security are:
- Enhanced security: IAM contributes to increased security levels by maintaining strict control over access to sensitive information, minimizing the risk of data breaches and security incidents.
- Compliance: IAM supports organizations in complying with various regulations, such as HIPAA, PCI DSS and GDPR. It ensures measures to protect sensitive data and limits access to authorized users, which is crucial to meet compliance requirements.
- Increased efficiency: IAM improves operational efficiency by automating the process of creating and managing digital identities. This reduces the workload of IT teams and speeds up the accurate granting of access.
- Cost savings: IAM helps organizations save costs by reducing the risk of security incidents and data breaches, resulting in the avoidance of costly legal proceedings, fines and reputational damage.
So, what do you need to do for identity and access management?
- Develop appropriate policies and procedures: To ensure secure access to systems and data, it is essential to formulate appropriate identity and access management policies and procedures. The policy should clearly define which persons have access to what resources, for what purpose and under what circumstances. Different categories of users, such as full-time and part-time employees, contractors, volunteers, students and visitors, should be considered.
- Guidelines for obtaining audit records: The policy should include specific guidelines for obtaining audit records, including measures to protect them from tampering. It should also address the identification of processes to be performed or authorized by multiple people. A key point is that the policy should apply not only to systems directly under the organization’s control, but also to all locations where the organization’s identities are used.
- Single Sign-On (SSO): Implementing organizational identities for online services is crucial to manage access to these services and revoke this access when an individual leaves the organization. Temporary accounts created for testing processes should be deleted or suspended as soon as they are no longer needed.
Multi-factor authentication to improve security of privileged accounts
To increase user account security, it is vital to consider multi-factor authentication (MFA) for all user accounts. It is crucial to select authentication methods that are proportionate to the risk and consistent with users’ natural ways of working. When implementing MFA, there should be considerations for user-to-service, user-to-device and device-to-service authentication.
- Multi-factor authentication (MFA): is essential for all online service accounts to provide protection against password guessing and theft. Users should have the option to choose from different self-authentication factors, such as SMS or e-mail messages, biometrics or physical tokens, as no single method is suitable for everyone or all environments and devices.
- A password policy: should be user-friendly and strike a balance between ease of use and security. The aim is to minimize the number and complexity of passwords to remember, for example by using single sign-on or allowing password managers. In this way, users are discouraged from unsafe practices such as reusing passwords, choosing easy-to-guess passwords or writing them down.
- Technical security measures: such as Multi-factor Authentication (MFA), setting account restrictions or blocks, monitoring suspicious behaviour and preventing the use of weak or exposed passwords, should be implemented. It is essential to protect references appropriately, both at rest and during transfer, to ensure overall safety.
In essence, considering multi-factor authentication for all user accounts, selecting appropriate authentication methods, implementing password policies and applying technical controls are fundamental steps to strengthen user account security. These measures help reduce the risk of unauthorized access and protect sensitive data for organizations.
the OpenSight 10 new year’s cyber security resolutions
During the OpenSight 10 new year’s cyber security resolutions, we will publish a blog each week about each of the ten resolutions as listed below:
- The company’s digital assets.
- Are my colleagues engaged and aware of cyber security?
- Are our company assets under control?
- Architecture focused on security and the business.
- How to keep vulnerability management in order?
- Who’s that? And what is he doing here?
- How do we protect digital assets?
- Is this normal behavior and does it happen more often?
- Preparation is key!
- Is there a weak link in my supply chain?
With these 10 new year’s resolutions, we at OpenSight hope to give you some insight regarding the ten steps you could take to decrease the chance and impact of an incident.
Want to know more?
Be sure to keep an eye on our blogs where, following these Cyber Security resolutions for 2024, we will cover all 10 topics in detail. Follow us on LinkedIn to be the first to know about all our updates!
What different types of hackers are there?
Geplaatst op: 27 December 2023

There are a lot of different definitions of the word ‘hacker’ available on the internet. The most commonly accepted definition of hacker is the following: a person who uses computers to get access to data in somebody else’s computer or phone system (without permission). Of course, there are different degrees of hacking and there’s also a difference in what kind of hackers there are. For example, there are hackers who don’t mean to inflict any harm, but do fall under the definition of ‘hacker’. This blog will tell you more about the different types of hackers.
Different types of hackers and their characteristics
In a previous blog on our website you could read more about the different forms of hacking and how you can protect yourself against these cyber-attacks. But every hacker works differently. Below is an overview of the different types of hackers that exist and how they operate.

Black Hat Hackers
First on this list are the black hat hackers. This kind of hacker hacks networks and systems in order to steal personal data, to inflict harm or to carry out any other illegal activity. The phrase ‘black hat’ refers to the fact that these types of hackers usually operate outside the law and don’t follow any moral codes that apply to legal hacking activities. Black hat hackers often use malware to infect computers or to phish users. Another approach these hackers often use is hacking websites to steal personal and/or sensitive data. The main goal of these hackers? Profit. Black hat hackers sell data and sensitive information of others on the dark web.
White Hat Hackers
On the other end of the spectrum we find the ‘white hat hacker’. These hackers are a lot ‘friendlier’ than the black hat hackers. These hackers, also known as ‘ethical hackers’, hack systems and networks for the purpose of detecting and resolving security vulnerabilities. This can be done with and without the consent of the company or organisation that is getting hacked. The term ‘white hat’ refers to the fact that these hackers, as opposed to the black hat hackers, do follow the rules of the law and adhere to the moral codes that are associated with it. For example, white hat hackers are often called in to help companies with security testing or they work with the government to detect security vulnerabilities. These hackers are professional security experts that are concerned with testing systems to see if they are vulnerable to attack. White hat hackers’ activities are focused on improving security and preventing cybercrime, rather than on making profit or harming systems.
Blue Hat Hackers
Blue hat hackers are kind of like white hat hackers. These hackers are hired by an organization or company to conduct a security assessment of their computer systems, networks and websites. The goal? Identify and fix weaknesses and vulnerabilities in the system so that companies are more resistant to attacks from malicious hackers. A Blue Hat Hacker is generally an ethical hacker. By that we mean they use their skills and expertise to improve security rather than harm or steal information.
Green Hat Hackers
Green hat hackers are the rookies of the whole bunch. This type of hacker just started learning about hacking and computer security. They oftentimes focus more on gaining knowledge and improving their skills than engaging in cybercrime. Green hat hackers are seen as the group in the middle: often morally grey and not as skilled as both the white hat hackers and the black hat hackers.
Script Kiddies
Last on the list of popular hackers are the script kiddies. Script kiddies are a type of hackers that use pre-existing tools and scripts, often without a full understanding of how they work, to attack computer systems and networks. They’re called “script kiddies” because they rely on scripts and tools written by others instead of on their own expertise. This is exactly why they usually aren’t taken very seriously as hackers, or at least, the degree to which they pose a threat. This group of hackers are often students and/or teenagers.
Protect your data
There are a lot of ways to get hacked. That is why it’s of importance to protect your accounts, systems and network against the different forms of hacking. As you can read in this article, there are also ethical hackers and security experts that you can call in to test the security of your company.
If you want to know more about hackers, types of hacking or need help with the security of your company, please contact one of our experts!
What is a hacker able to see and/or do?
Geplaatst op: 27 December 2023

Hackers, cyberattacks, phishing E-mails. These days it seems like half of the news is about cyber attacks. Unfortunately, these types of happenings are indeed on the rise. Since there is still a lot of uncertainty about what exactly a hacker can see or do, we will tell you more in this article.
What is a hacker?
According to the dictionary a hacker is a person who uses computers to get access to data in somebody else’s computer or phone system (without permission). This means that if you’re able to get into someone’s laptop, you’re a hacker. At OpenSight we think this definition is a little too broad. There’s a significant difference between ethical hacking and hacking with malicious intent. For example, when someone tries to enter a system solely to find vulnerabilities in said system, this is not necessarily a hacker in our definition. We distinguish different types of hackers like Grey hat hackers, White hat hackers, Green hat hackers, Blue hat hackers and Red hat hackers. Every hacker has a different method or hacks with a specific goal in mind. In the previous articles on our website, we explain exactly what types of hacking there are and how you can protect yourself against a hacker or cybercriminal.

How can I check if I’ve been hacked?
But how do you know if you’ve been hacked? There are a few signals that show you that you’ve been hacked. Some examples below:
- Login problems: Suddenly you can’t get into your (social media) accounts, even though you’re using the right password.
- Warnings: A lot of companies send an E-mail if someone tries to log into your account. Aren’t you the one logging in? Then it could be possible someone is trying to break into your account.
- Slow electronics: Your laptops or phones are extremely slow.
- Pop-up spam: All of a sudden, your screen is filled with pop-ups. This is a form of adware.
- Weird chat messages: Your friends and family get weird messages from your account, and you didn’t send them. This is often a case of cybercriminals trying to get money via WhatsApp or other communication platforms.
- Encrypted files: Files that were previously open are now suddenly encrypted on your computer. This is a form of ransomware.
These are just a few examples of signs that could indicate that you’ve been hacked. There are also countless tools online that can help finding out whether you have been hacked. For example, do you want to know whether your email has been hacked? You can use the website ‘Have I Been Pwned?’, and it will check for you.
I’ve been hacked, what do I do?
Firstly, it’s important to remain calm. There are a lot of ways to get hacked, but it doesn’t automatically mean you are in danger. It is, however, important to take the right steps to decrease risks. Have you been hacked? First scan your device with a virus scanner, which detects ransomware and other suspicious software for you. Oftentimes a virus scanner will put suspicious files and software in ‘quarantine’. Deleting the file of the software from your device will be easier this way. In addition, it is important to change all your passwords in the event of a hack. As annoying as it is, this is the best way to keep hackers out and prevent real damage. Next to changing your passwords you should also ensure that software is always up to date. This keeps hackers from casually breaking into your devices. If a work computer or laptop has been hacked, you should always report this to your manager or supervisor and make sure that colleagues are aware. This prevents hackers from gaining access to multiple computers and sensitive data from company systems.
Should you recognize one of the above signals and suspect that you have been hacked? Make sure you consult an expert! If you haven’t encountered a cyber attack yet, it’s better to be safe than sorry. Always make sure that you protect your valuable data against cybercriminals and ransomware. Want to secure your data professionally and efficiently? Contact one of our experts!
What is a ransomware attack?
Geplaatst op: 27 December 2023

A large proportion of the working people have been working from home for the past two years. This means a large part of the business conversations and activities took place online. While this way of working had positive effects, it also opened the door for data leaks and cybercrime. In this article we’ll tell you everything about ransomware, what it is, how it works and what you can do against it.
What is malware?
Malware is an umbrella term for software like viruses, spyware, and Trojan horses. Malware usually ends up on a computer or network when employees click on a link or document that contains this software. Because many organizations’ work traffic has been from home in recent years, we are seeing an increase in malware attacks.
What is ransomware?
Ransomware is a form of malware. This form of malware ensures that people within the organization can no longer access important documents or processes that are essential to keep the organization running. Often a large ransom is demanded from the organization to regain access, hence the name. Here are some more types of ransomware that hackers can use:
- Screen locker ransomware: A form of ransomware that blocks the access to your screen.
- PIN locker ransomware: This one changes the pin code of your device, so you can no longer log in.
- Disk coding ransomware: This form of ransomware encrypts the Master Boot Record and other (file) system structures. As a result, you no longer have access to the operating system. As a result, you no longer have access to the operating system.
- Crypto ransomware: This is a pesky type of ransomware because it encrypts all user files on the disk.

What to do when a ransomware attack occurs?
Ransomware attacks have also been on the rise in 2022. According to research by cybersecurity expert Acronis global damage from ransomware is estimated to exceed $30 billion by 2023. If you must deal with a ransomware attack yourself, take the following steps:
- The first rule in case of a ransomware attack is to never pay ransom. This will only add fuel to the fire. Cybercriminals will see you as an easy target and will have extra reason to carry out more attacks. Remember: these hackers are criminals! You have no guarantee that they will hold up their end of the bargain.
- Is only one computer or device within the corporate network affected by a ransomware attack? Isolate this device immediately! You can do this by disconnecting the network connection.
- Encrypted files can be ‘decrypted’ with recovery programs, also known as decryptors No decryptor available? In that case backups are the only way to get files back. Make sure you regularly make backups of your documents.
- When a ransomware attack only encrypts specific files involving personal data, then it is officially seen as a data breach. You have to report this to the Data Protection Authority within 72 hours.
- We’ve mentioned it quite a lot, but it can’t be repeated too often: Make sure that existing software, applications, and devices are always up to date. That also means the operating system!
How to protect your organization from ransomware?
Unfortunately, it’s impossible to completely rule out a ransomware attack. The right security software and security measurements, however, go a long way. The most important aspect on how to survive a ransomware attack is timing. The earlier you intervene, the better. The above tips help detect and combat an attack early. We’d like to emphasise it once more: regular backups will significantly reduce the impact of a ransomware attack!
Want to know more about the impact of ransomware attacks on your company or how you can better protect important data against cybercriminals? Please contact one of our experts. We are happy to help!
