Cegeka Careers Language Why Cegeka Back
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions Back
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

website_navigation_dms_cegeka_uk

Disclosure Management System

Transformation and implementation of our information disclosure product

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services Back
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

AgileCoaching_Blog_The applicability of Agile and Scrum

Agile and DevOps Services

Your guide on your journey towards sustainable value delivery

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries Back
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

Website_Navigation_Finance_and_Insurance-1

Finance & Insurance

Take a major step towards cloud computing to increase effectiveness through the use of AI and big data.

Industries_Federal_Social_Government_Headervisual_General_1000x800px

Federal & Social Government

Embrace digitalization and harness the power of data to make citizens' lives easier, work smarter and boost efficiency.

Website_Navigation_Telecom_UK

Telecom

Unlock the potential of 5G and IoT to deliver faster, smarter, and more reliable services.

Insights Back
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Back
Select language

English - United Kingdom

Corporate (English)

Austria (German)

Belgium (Dutch)

Belgium (French)

Denmark (English)

Germany (German)

Greece (Greek)

Italy (Italian)

Romania (English)

Sweden (English)

The Netherlands (Dutch)

United Kingdom (English)

Let’s get in touch
Cegeka Why Cegeka
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

website_navigation_dms_cegeka_uk

Disclosure Management System

Transformation and implementation of our information disclosure product

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

AgileCoaching_Blog_The applicability of Agile and Scrum

Agile and DevOps Services

Your guide on your journey towards sustainable value delivery

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

Website_Navigation_Finance_and_Insurance-1

Finance & Insurance

Take a major step towards cloud computing to increase effectiveness through the use of AI and big data.

Industries_Federal_Social_Government_Headervisual_General_1000x800px

Federal & Social Government

Embrace digitalization and harness the power of data to make citizens' lives easier, work smarter and boost efficiency.

Website_Navigation_Telecom_UK

Telecom

Unlock the potential of 5G and IoT to deliver faster, smarter, and more reliable services.

Insights
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Corporate (English) Austria (German) Belgium (Dutch) Belgium (French) Denmark (English) Germany (German) Greece (Greek) Italy (Italian) Romania (English) Sweden (English) The Netherlands (Dutch) United Kingdom (English) Careers Let’s get in touch
Home Discover our latest blogs Discover our latest blogs Secure digital workplace & prevention | Step 1
Digital Workplace
3 minutes reading

Secure digital workplace & prevention | Step 1

With more and more employees having access to company data anywhere, anytime and from any device, cyber crime is skyrocketing. So, what can you do to keep your corporate data safe? The Microsoft Office 365 E5 Security Plan provides comprehensive, built-in protection to disrupt the cyber kill chain in every step. Learn how Microsoft Defender for Office 365 helps you in the first stages, preventing a potential intrusion.

Tom Speijer

Tom Speijer

December 08, 2020

A cyberattacker needs various actions to successfully infiltrate a network and exfiltrate data from it. That sequence of actions is described in the cyber kill chain. Understanding this chain makes it easier to design and monitor a response plan to ‘kill’ it: prevent the attack or, in the worst case, minimize the damage done. Here’s what a cyber kill chain looks like:

Digital_Workplace_Security_Cyber_Kill_Chain_Dekstop_01

Preventing a cyberattack: four categories

A cyberattacker may cause harm in different ways, via different channels. Make sure to prevent attacks by securing your:

  1. Devices: computers, mobile devices, servers, ...
  2. Applications: software, mobile apps, services, ...
  3. Identities: user accounts and credentials
  4. Data: documents, emails, ...

Infiltrating your network via email or browser

One of the first stages in the cyber kill chain is the intrusion step: the attackers are attempting to get a foothold in your network or device to then exploit existing vulnerabilities. 90% of all cyber attacks start with a phishing email. The phishing techniques used are diverse: from installing malware via a malicious email attachment and embedding an URL in an email that redirects you to an unsecure website to spoofing the sender address. More and more phishing attacks also include ransomware which freezes a company’s IT system in an attempt to generate ransom payments to the attackers.

90% of all cyberattacks start with an e-mail.

In addition, cybercriminals can also gain entry to your computer or other devices via your browser. Once they have forced their way in, they can manipulate or steal data or spread malicious code throughout the company network.

Open mails and attachments and click URLs without fear

Included in your Microsoft Office 365 E5 Security Plan, Microsoft Defender for Office 365 - the new name for Office 365 Advanced Threat Protection – helps disrupt sophisticated, malicious threats posed during this initial ‘infiltration phase”. The suite integrates a series of advanced capabilities that make use of machine learning to scan emails and block or flag emails, links or attachments that may corrupt your hard drive, steal your data or expose you to other types of fraud:

  • Anti-phishing capabilities
    When an email enters your inbox it is scanned by MS Defender for malware. Machine learning models evaluate the email to decide whether it is a malicious email. If so, the email is removed and the user and admin are notified.
  • Safe attachments
    Emails with attachments are checked for malicious content: the file is routed to a special environment where it is automatically opened and tested, using machine learning models. If the file is found to be safe, it'll open as expected. If not, it will be removed automatically.
  • Safe links
    If you receive an email containing an URL, the Safe Links feature will automatically check the URL before you click it. If the URL is safe, it'll open as usual. If not, a page will pop up warning you of a potentially harmful link.

Thanks to the dashboard functionality, your IT or security team gets insights on all the security incidents that occur – ready to take the appropriate action if needed.

First and foremost: raise employee awareness

In spite of all the Microsoft 365 technology you may use to defend your systems from malicious attacks, there is one important extra factor to take into account at all times: employee awareness. All it takes is one person, one time, to become careless to cause a data breach. So, first and foremost, educate your employees and conduct training sessions to make sure that they understand the types of attacks they may face. Inform them to be wary of e-mails with attachments from people they don't know. Let them know that no credible supplier, bank or website would ask for their password over e-mail and stress they need to be careful which browsers or cloud applications – e.g. Dropbox – they use.

All it takes is one person, one time, to become careless to cause a data breach. So, first and foremost, educate your employees and conduct training sessions.

Preventing identity breaches

When staff awareness is combined with effective technology, you have taken your first steps to prevent malicious e-mail attacks. Yet, what about preventing identity breaches and keeping hackers out of your system to prevent data theft or tampering? We’ll explain all about that second and third steps in our next blog posts on security in the digital workplace.

Tom Speijer

Tom Speijer

More of Tom Speijer articles

Get in touch