icon

Cybersecurity

In recent years, IT has become the lifeline of every business. It is impossible to imagine life without IT and organizations cannot operate without it. With the increase in the (decentralized) use and importance of IT, digital security is subject to many changes. Malicious hackers are creative and make clever use of new technology, which means that organizations are continuously faced with new challenges to secure their business.

An additional challenge is that hackers are automating and outsourcing their work. As a result, anyone and any organization, regardless of their size, has become a target. Only after the ransomware has spread throughout the organization is it examined how best to extort the company and what redemption is just affordable for the organization. By the time the ransomware has been activated, it is actually too late. The support required in an incident response is so costly that it is a financial noose for any organization. It is therefore vital that basic prevention is in place. PLTFRM and its partners have a solution for every type of organization and can independently advise on the approach that fits best.

Our advice is to always start with a security scan. Depending on the outcome, you then build a security mesh from the following categories:

  • Security audit & testing: An audit or scan to determine where you stand as an organization and which actions still need to be taken. The trusted PLTFRM partners help organizations with this first step and can also support the subsequent steps for implementation, risk assessment, testing, compliance and audits.
  • Ransomware: The PLTFRM partner network supports customers with preventive measures, detection, response/response (in case of an incident) and alerting services. Regardless of whether the organization is at the beginning of the security issue or already has the basics in place and wants to take the next step, from the PLTFRM network of specialist partners we can support the workplace, the network and the data center to improve security.
  • Application security: In addition to securing the workplace and the data center, application security is equally important. This takes place by identifying and monitoring vulnerabilities in applications. PLTFRM partners are able to advise and perform application scans & monitoring, minimizing the number of vulnerabilities.
  • Network Security: All communication between the data center, the workplace and the cloud goes over the network. It is therefore important to secure this critical component properly. PLTFRM partners can help identify, secure, alert and monitor the (software defined) network. For services such as network intrusion detection, secure DNS and Security Operations Center (SOC) you can turn to PLTFRM.

Results: 3 Services

Size

20

Services

PLTFRM services

2

ISO27001 / NEN75710 / BIO Certification

Categorie: Certification

Certifying your company against standards such as ISO27001, NEN7510, TISAX, and the Baseline Information Security for Dutch Municipalities (BIO) indicates that you take cybersecurity seriously and are constantly working towards improving the level of security. The framework of these standards consists of a number of mandatory processes that need to be implemented. These include, for example, risk management, selecting measures, setting KPIs, determining your organisation's context, carrying out an internal audit, and conducting a management review. Additionally, the standard includes control measures that may or may not be applicable to your organisation.

Cyber4Z can guide you through the entire process from the start to certification. In most cases, we begin with a GAP assessment. This is because many organisations have already implemented security measures, but have not yet assessed their effectiveness. Based on the assessment, a plan is then developed, and we start implementing the processes and measures. We always do this in collaboration with the organisation, as ultimately you should be able to maintain the management system yourself. Additionally, we try to minimise the impact on your operations by only adding security-related activities. This ensures the highest level of acceptance within your organisation. Finally, we conduct an internal audit to determine the effectiveness of the measures, so that the external audit can ultimately verify the design, existence, and operation of the management system and award you the certificate.

Another option is to outsource certain parts of the certification process, so that your organisation does not have to bear additional burdens, or because the internal expertise is (still) lacking. Examples of this include:

- Conducting a GAP assessment;
- Carrying out and guiding a risk analysis session;
- Writing policy documents, processes, procedures, and standards that align with your own strategic frameworks;
- Performing internal audits;
- Implementing technical and organisational security measures.