www.belgium.be Logo of the federal government

Reports and alerts

In case of a ransomware attack, there are several steps that you can take to handle the incident efficiently. In this document we will give more information on how to respond to the incident and to help prevent this in the future.
mobile security
In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of the corporate network as well as personal data.
Organisations should assume that sooner or later they will be confronted with a ransomware attack. The main question is when. Preparation is key. This is a guide about urgent actions to take when a ransomware has hit your company.
If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions.
A Distributed Denial of Service, or DDoS, is a cyber attack that impedes the normal data traffic of a particular service. It can have a major impact on the operations of organisations and businesses.
This document provides an overview and assessment of various vulnerability reports.