Menu

Let us advice you!

Cyber security

Cyber security is important for everyone. Nobody wants to be hacked or lose files and data. This can lead to huge financial and emotional damage both in business and private life.

When it comes to cyber security for organisations and businesses, there are even obligations. Do you handle sensitive (customer) data? Then you are legally obliged to meet certain standards.

Contact OpenSight directly as an incident response provider, or contact your IT administrator or service provider.

Immediately disconnect the hacked device from other networks such as wired internet, wifi, bluetooth and turn off the device.

Does it involve a hack with login credentials? If so, you would do well to immediately change all passwords that are the same, very similar or follow the same pattern.

Do you have linked accounts? If so, unlink them as soon as possible.

Certificates

No, cyber security certificates are not mandatory. At least fundamentally, cyber security certificates are not mandatory, but many sectors are subject to laws and regulations that require some certificates, such as ISO or NIS. Most certifications are customised, as it varies by industry and size of organizations what they need to comply with.

At OpenSight, we support in obtaining and maintaining cyber security certifications . Feel free to contact us for advice or request a free demo.

Organisations can use various tools such as the Digital Trust Centre’s risk analysis roadmap. In addition, it’s wise to appoint a NIS2 compliance officer who is responsible for the implementation and compliance of the NIS2 directives within the company. This is because the NIS2 has major consequences for companies and organizations in Europe, including the Dutch business community.

Do you want simplicity and certainty? Then choose OpenSight’s help with the certification process. With the help of our experts, we provide transparency for you as a company, expertise for cybersecurity solutions and necessary documentation and logging to comply with cybersecurity standards such as NIS2.

ISO 27001 is a globally recognised standard in the field of information security. Part of the ISO 27000 series, this standard helps secure information in its broadest sense – digital, printed, internal or external. An ISO verification uses a management system that must meet the requirements set out in the standard. Within this management system, a risk analysis is used to determine which measures apply to the organization. So that the safety measures fit seamlessly into all business processes.

To obtain ISO 27001 certification, the external auditor must see sufficient evidence that management is in control. This is done by assessing the management system against the standard requirements and testing the policies and measures taken. If the auditor gives a positive opinion then a certificate will be issued.

ISO 9001 is a globally recognized standard in the field of quality. The standard is part of the ISO 9000 series and it supports quality control within your organization. Inside an ISO certification, a management system is used that has to meet the requirements set in the standard. A risk analysis is used to determine which measures apply to the organization. This allows the measures to fit seamlessly into the organization’s processes.

To obtain ISO 9001 certification, an organization must demonstrate to an external auditor that it has adequate management control. This is done by assessing the management system against the requirements of the standard and by examining the policies and procedures in place. If the auditor gives a positive opinion, a certificate is issued.

CIS V8 stands for Center for Information Security version 8 and contains a number of critical controls for information security. CIS V8 was drafted by several security specialists around the world, with no commercial interest, to provide organizations with optimal security. The security measures discussed within CIS V8 ensure that organizations are well protected against the most common cyber attacks on systems and networks.

CIS controls are not part of ISO and therefore not certifiable through that standard. However, OpenSight does certify the CIS controls. This process works largely the same as an ISO audit, the difference being that we test the actual measures instead of a management system. This gives the internal organization full insight into the existence and operation of security controls within the organization.

Services

Security is at the heart of what we do at OpenSight. Our approach is based on three inseparable pillars: People, Process and Technology. We aim to improve your security quickly and cost-effectively, so that it fits seamlessly with your business needs.

People
Our focus on ‘People’ aims to strengthen your internal cyber security culture. We strongly believe in the power of your employees as the first line of defense against potential attacks. Through targeted training, awareness activities and ongoing guidance, we turn your teams into experts in recognizing and averting digital threats.

Process
In the ‘Process’ category, we fortify your defenses by implementing cyber security processes that integrate seamlessly into your operations. Our customized cyber security processes are designed for efficiency, enabling your organization to respond quickly to incidents, meet compliance requirements and control risks. Effectively fortify your operations against cyber threats.

Technology
Rely on our advanced ‘Technology‘ stack tailored to your specific needs. From advanced threat detection to automated response mechanisms, our technology tools allow you to stay one step ahead in the ever-evolving landscape of cybercrime. Protect your digital assets with innovative cyber security technology and increase your resilience against the constant evolution of cyber threats.

Although we offer these services in three separate categories, together they form a powerful whole. At OpenSight, we connect People, Process and Technology to provide you with a comprehensive and effective security solution.