We are at your service!
We are always at your service and look forward to contacting you.
Fill in the contact form, email info@opensight.nl or call 085 – 303 10 10 .
Leave a message
“We guide you to a safe tomorrow”
~ Marcel Krommenhoek
Personal advice
Let us advice you!
Cyber security can seem very complex and complicated, but it doesn’t have to be like that at all. Unsure which services are best for you? We will be happy to give you personal advice, tailored to the wishes, requirements and needs of your situation. This way, you will always be well prepared and know exactly where you stand.
Details
Contact details
OpenSight B.V.
+31 (0) 85 – 303 10 10
info@opensight.nl
Accessibility
We are available 24/7 via e-mail and our contact form. By phone, we are available Monday to Friday between 9am and 5pm.
Details
KVK: 80616178
BTW: NL123456nb601
Are you already following us?
Frequently asked questions
Cyber security
Cyber security is important for everyone. Nobody wants to be hacked or lose files and data. This can lead to huge financial and emotional damage both in business and private life.
When it comes to cyber security for organisations and businesses, there are even obligations. Do you handle sensitive (customer) data? Then you are legally obliged to meet certain standards.
Contact OpenSight directly as an incident response provider, or contact your IT administrator or service provider.
Immediately disconnect the hacked device from other networks such as wired internet, wifi, bluetooth and turn off the device.
Does it involve a hack with login credentials? If so, you would do well to immediately change all passwords that are the same, very similar or follow the same pattern.
Do you have linked accounts? If so, unlink them as soon as possible.
Certificates
No, cyber security certificates are not mandatory. At least fundamentally, cyber security certificates are not mandatory, but many sectors are subject to laws and regulations that require some certificates, such as ISO or NIS. Most certifications are customised, as it varies by industry and size of organizations what they need to comply with.
At OpenSight, we support in obtaining and maintaining cyber security certifications . Feel free to contact us for advice or request a free demo.
Organisations can use various tools such as the Digital Trust Centre’s risk analysis roadmap. In addition, it’s wise to appoint a NIS2 compliance officer who is responsible for the implementation and compliance of the NIS2 directives within the company. This is because the NIS2 has major consequences for companies and organizations in Europe, including the Dutch business community.
Do you want simplicity and certainty? Then choose OpenSight’s help with the certification process. With the help of our experts, we provide transparency for you as a company, expertise for cybersecurity solutions and necessary documentation and logging to comply with cybersecurity standards such as NIS2.
ISO 27001 is a globally recognised standard in the field of information security. Part of the ISO 27000 series, this standard helps secure information in its broadest sense – digital, printed, internal or external. An ISO verification uses a management system that must meet the requirements set out in the standard. Within this management system, a risk analysis is used to determine which measures apply to the organization. So that the safety measures fit seamlessly into all business processes.
To obtain ISO 27001 certification, the external auditor must see sufficient evidence that management is in control. This is done by assessing the management system against the standard requirements and testing the policies and measures taken. If the auditor gives a positive opinion then a certificate will be issued.
ISO 9001 is a globally recognized standard in the field of quality. The standard is part of the ISO 9000 series and it supports quality control within your organization. Inside an ISO certification, a management system is used that has to meet the requirements set in the standard. A risk analysis is used to determine which measures apply to the organization. This allows the measures to fit seamlessly into the organization’s processes.
To obtain ISO 9001 certification, an organization must demonstrate to an external auditor that it has adequate management control. This is done by assessing the management system against the requirements of the standard and by examining the policies and procedures in place. If the auditor gives a positive opinion, a certificate is issued.
CIS V8 stands for Center for Information Security version 8 and contains a number of critical controls for information security. CIS V8 was drafted by several security specialists around the world, with no commercial interest, to provide organizations with optimal security. The security measures discussed within CIS V8 ensure that organizations are well protected against the most common cyber attacks on systems and networks.
CIS controls are not part of ISO and therefore not certifiable through that standard. However, OpenSight does certify the CIS controls. This process works largely the same as an ISO audit, the difference being that we test the actual measures instead of a management system. This gives the internal organization full insight into the existence and operation of security controls within the organization.
Services
Security is at the heart of what we do at OpenSight. Our approach is based on three inseparable pillars: People, Process and Technology. We aim to improve your security quickly and cost-effectively, so that it fits seamlessly with your business needs.
People
Our focus on ‘People’ aims to strengthen your internal cyber security culture. We strongly believe in the power of your employees as the first line of defense against potential attacks. Through targeted training, awareness activities and ongoing guidance, we turn your teams into experts in recognizing and averting digital threats.
Process
In the ‘Process’ category, we fortify your defenses by implementing cyber security processes that integrate seamlessly into your operations. Our customized cyber security processes are designed for efficiency, enabling your organization to respond quickly to incidents, meet compliance requirements and control risks. Effectively fortify your operations against cyber threats.
Technology
Rely on our advanced ‘Technology‘ stack tailored to your specific needs. From advanced threat detection to automated response mechanisms, our technology tools allow you to stay one step ahead in the ever-evolving landscape of cybercrime. Protect your digital assets with innovative cyber security technology and increase your resilience against the constant evolution of cyber threats.
Although we offer these services in three separate categories, together they form a powerful whole. At OpenSight, we connect People, Process and Technology to provide you with a comprehensive and effective security solution.