Tilburg City of Learning
About
Playlists
Sign up
1

HOFFMANN CYBERSECURITY

Join
OverviewBadges

HOFFMANN CYBERSECURITY

Join

Content

Company information is worth its weight in gold. You like to keep that in safe hands. In the digital world in which we live, this is not so easy. This often requires more secure networks, well-thought-out processes, and cyber-aware employees.With preventive research into information security, Hoffmann provides insight into the crown jewels of a company and where the business risks lie. Together with the company, it is determined where immediate attention is needed and where less, looking at technology, processes, and people's behavior. Hoffmann has the specialists, technology, and tools in-house to optimize the information security of companies and to train employees in cyber-safe behavior. This reduces the chance of becoming a target of cybercrime or espionage. Should an incident nevertheless take place, experienced advisers are ready to take immediate action.

Challenges for Hoffmann
Cyber-attacks have been in the news again a lot lately. For example, the systems of the Hof van Twente municipality were encrypted and hackers could view information about the Pfizer vaccine at the European Medicines Agency (EMA) in Amsterdam. At Hoffmann, they have noticed for some time that the fear of cyber attacks with ransomware is on the increase.
This fear is justified because hackers are currently targeting (large) SMEs, governments, and large (international) companies. There they can demand large amounts of ransom. Also, hackers are increasingly professional. They nowadays think more carefully about how they approach their targets. Not long ago, they sent an email (often poorly worded) with an infected attachment to many different individuals and businesses. A shot with hail, as it were. Nowadays they opt for a very focused and personal approach, in which they research the organization and the people who work there in advance. This allows them to send a personalized and credible email, increasing the likelihood that the attachment will also be opened.
They still shoot with hail. But because they respond much more than before to current events and sentiments in society, these e-mails are much more effective. For example, many fraudulent emails this year had a subject related to corona (updates, the NOW scheme, or vaccines), the benefits affair at the Tax Authorities, and - most recently - Black Friday. The chance that a recipient of such an e-mail will click on the attachment is much bigger than with a less topical or sensitive subject.
Until recently, hackers allowed the malware to automatically spread across the network to encrypt files. Nowadays they provide themselves with access to the network and are very focused on looking for opportunities to penetrate and infect critical systems.They also look for backups and backup systems, to encrypt them and/or make them inaccessible. This makes it less easy for organizations to ignore a ransom demand because they can no longer use the backup systems.
Finally, we see that hackers not only encrypt data and then request a ransom, but also increasingly steal (sensitive) data. This allows them to reinforce their ransom demand and increase the pressure by threatening to make that information public.

Resources

  • Types of cybercrime

Get activity badge

Get activity badge subtitle

HOFFMANN CYBERSECURITY Get this badge

Company information is worth its weight in gold. You like to keep that in safe hands. In the digital world in which we live, this is not so easy. This often requires more secure networks, well-thought-out processes, and cyber-aware employees.With preventive research into information security, Hoffmann provides insight into the crown jewels of a company and where the business risks lie. Together with the company, it is determined where immediate attention is needed and where less, looking at technology, processes, and people's behavior. Hoffmann has the specialists, technology, and tools in-house to optimize the information security of companies and to train employees in cyber-safe behavior. This reduces the chance of becoming a target of cybercrime or espionage. Should an incident nevertheless take place, experienced advisers are ready to take immediate action.

Challenges for Hoffmann
Cyber-attacks have been in the news again a lot lately. For example, the systems of the Hof van Twente municipality were encrypted and hackers could view information about the Pfizer vaccine at the European Medicines Agency (EMA) in Amsterdam. At Hoffmann, they have noticed for some time that the fear of cyber attacks with ransomware is on the increase.
This fear is justified because hackers are currently targeting (large) SMEs, governments, and large (international) companies. There they can demand large amounts of ransom. Also, hackers are increasingly professional. They nowadays think more carefully about how they approach their targets. Not long ago, they sent an email (often poorly worded) with an infected attachment to many different individuals and businesses. A shot with hail, as it were. Nowadays they opt for a very focused and personal approach, in which they research the organization and the people who work there in advance. This allows them to send a personalized and credible email, increasing the likelihood that the attachment will also be opened.
They still shoot with hail. But because they respond much more than before to current events and sentiments in society, these e-mails are much more effective. For example, many fraudulent emails this year had a subject related to corona (updates, the NOW scheme, or vaccines), the benefits affair at the Tax Authorities, and - most recently - Black Friday. The chance that a recipient of such an e-mail will click on the attachment is much bigger than with a less topical or sensitive subject.
Until recently, hackers allowed the malware to automatically spread across the network to encrypt files. Nowadays they provide themselves with access to the network and are very focused on looking for opportunities to penetrate and infect critical systems.They also look for backups and backup systems, to encrypt them and/or make them inaccessible. This makes it less easy for organizations to ignore a ransom demand because they can no longer use the backup systems.
Finally, we see that hackers not only encrypt data and then request a ransom, but also increasingly steal (sensitive) data. This allows them to reinforce their ransom demand and increase the pressure by threatening to make that information public.
Tasks
Task no. 1
Evidence verified by: one activity organiser
Hoffmanns challenge for you: Not only companies but individuals too are increasingly confronted with cybercrime. Many young people are not or only partially aware of the cybercrime dangers, while they use their mobile phones or other digital devices every day. How can you help other young people to become more aware of cybercrime and what they can do themselves to prevent cybercrime?

Badges
1

Skills

ESCO
#cyber security
Technology and computers
Joined (2)
Added to playlist (1)
Time to complete: 30 minutes
Share:

Organisers

Tilburg City of Learning
Hoffmann
NexxDott

Used in playlists

Befriend with the machines
Tilburg City of Learning
Badgecraft hosts this platform and develops it together with leading educational organisations. The European Union's programme Erasmus+ granted co-funding for building the first version of this platform. Contact support@badgecraft.eu.
Platform
Change to another language:
Co-funded by the Erasmus+ programme of the European Union
HomeAll activitiesPlaylistsMap