{"id":476641,"date":"2024-05-10T15:00:00","date_gmt":"2024-05-10T13:00:00","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=476641"},"modified":"2024-05-10T15:00:00","modified_gmt":"2024-05-10T13:00:00","slug":"consumers-and-businesses-beware-lack-of-a-backup-strategy-will-cost-you-dearly","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/consumers-and-businesses-beware-lack-of-a-backup-strategy-will-cost-you-dearly\/","title":{"rendered":"Consumers and businesses beware: \u2018Lack of a backup strategy will cost you dearly\u2019"},"content":{"rendered":"\n<p>Whether it is Microsoft, the KNVB, beer brewery Duvel, a baby TV show, or our hoovers: companies and consumers are increasingly facing cyber attacks. But, how do cyber attacks work? How can businesses guard against them? And what can you do to stay safe? In this column, we put these &#8211; and other &#8211; questions to expert Patrick Jordens. He is the director of Trusted Third Party (TT3P): a Dutch company specialising in cybersecurity. TT3P helps companies better defend themselves against, among other things, hackers taking company systems hostage or unlawfully obtaining data.<\/p>\n\n\n\n<div class=\"io-block io-block__box\"><h2>Patrick Jordens<\/h2><p>Patrick Jordens (1969) is an entrepreneur with a heart for digital security. He is director of Trusted Third Party and founder of DMCC Group, which helps organizations comply with all external laws, regulations and internal policies in the field of privacy and consumer law. He is also a guest lecturer in marketing, data privacy and ethics at the Hogeschool van Rotterdam.<\/p><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The number of cyber-attacks has <a href=\"https:\/\/rootsec.nl\/overzicht-cyberaanvallen-2023\/\">increased<\/a> considerably in recent years. Why is that?<\/h2>\n\n\n\n<p>&#8220;Since the COVID-19 pandemic, the number of incidents has increased significantly. Criminals also had to stay indoors and they focused on cybercrime. Moreover, people started working from home en masse. Organizations became more vulnerable as a result.<\/p>\n\n\n\n<p>The continuous development of technologies also contributes to the growth of cybercrime. Criminals around the world have access to generative AI, for example. Within no time, they draft a phishing email in perfect Dutch with ChatGPT.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/archive.ioplus.nl\/wp-content\/uploads\/2024\/05\/MG_4363-2-669x1004.jpg\" alt=\"\" class=\"wp-image-476867\" width=\"212\" height=\"319\"\/><figcaption class=\"wp-element-caption\">Patrick Jordens<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Let&#8217;s zoom in on companies. Can we find a common thread in the types of attacks they face?<\/h2>\n\n\n\n<p>&#8220;There are two types of attacks that we are seeing a lot of lately. One is data extraction. This involves stealing data from a company. The <a href=\"https:\/\/nos.nl\/artikel\/2490181-knvb-betaalt-losgeld-aan-hackers-om-vertrouwelijke-gegevens-te-beschermen\">attack<\/a> on KNVB is an example of this.<\/p>\n\n\n\n<p>A second category is hostage software, malware, and ransomware. This puts pressure on the continuity of your organization. You will no longer be able to continue working. When you start up your computer in the morning, nothing happens. Installation company Hoppenbrouwers had to <a href=\"https:\/\/solarmagazine.nl\/nieuws-zonne-energie\/i24842\/installateur-van-zonnepanelen-hoppenbrouwers-getroffen-door-cyberaanval\">deal<\/a> with this three years ago.&#8221;<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link advgb-dyn-9b920a18\"><a href=\"https:\/\/ioplus.nl\/archive\/en\/dutch-eye-security-raises-e36-million-a-boost-for-cyber-security\/\" class=\"vlp-link\" title=\"Dutch Eye Security raises \u20ac36 million: a boost for cyber security\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">Dutch Eye Security raises \u20ac36 million: a boost for cyber security<\/div><div class=\"vlp-block-1 vlp-link-summary\">Unfortunately, a large proportion of businesses today face cyber attacks. Eye Security recently secured \u20ac36 million in funding. <\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">Where are the vulnerabilities of many Dutch companies?<\/h2>\n\n\n\n<p>&#8220;Many organizations and companies underestimate the importance of a well-thought-out backup strategy. They often only back up every so often. I recently spoke to a company from the Westland region that a ransomware attack had hit. The last backup they had made had failed and therefore they had to restore an old one.<br>When companies get hacked and restore their systems to a backup a few weeks old, a lot of data is lost. Companies need to ask themselves how much data loss they can afford. In addition, they need to think carefully about where they store that backup. Because the first thing hackers do when they penetrate your system is to encrypt the backup, that&#8217;s how they try to gain power over the company.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The number of cyber attacks seems to be anything but decreasing. How next?<\/h2>\n\n\n\n<p>&#8220;I hope companies will take cyber security more seriously in the coming years. Many large organizations are already aware of their security; SMEs and charities in particular need to start taking steps. Often, the thinking among smaller organisations is: there is nothing to be gained from us. And then cyber security is pushed into the background. That makes them a very desirable target. Yes, it costs money to protect yourself. But it costs you much more if you become a target.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether it is Microsoft, the KNVB, beer brewery Duvel, a baby TV show, or our hoovers: companies and consumers are increasingly facing cyber attacks. But, how do cyber attacks work? How can businesses guard against them? And what can you do to stay safe? In this column, we put these &#8211; and other &#8211; questions [&hellip;]<\/p>\n","protected":false},"author":1780,"featured_media":506470,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[84026,42],"tags":[84453],"location":[6763],"article_type":[6758],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[82795],"class_list":["post-476641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data","category-sustainability-nl","tag-cyber-security-4","location-netherlands","article_type-interview","reboot-archive-data"],"blocksy_meta":[],"acf":{"subtitle":"In the Cracked by Jordens series, we look at the cyber security of consumers and businesses in the Netherlands. Today, we cover the increasing number of incidents.","text_display_homepage":false},"author_meta":{"display_name":"Elcke Vels","author_link":"https:\/\/ioplus.nl\/archive\/author\/elckevels\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2024\/05\/hacked2.png","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/data\/\" class=\"advgb-post-tax-term\">DATA+<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Sustainability<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">DATA+<\/span>","<span class=\"advgb-post-tax-term\">Sustainability<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/sustainability-nl\/\" class=\"advgb-post-tax-term\">Cyber security<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Cyber security<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on May 10, 2024","modified":"Updated on May 10, 2024"},"absolute_dates_time":{"created":"Posted on May 10, 2024 3:00 pm","modified":"Updated on May 10, 2024 3:00 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/476641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/1780"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=476641"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/476641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/506470"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=476641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=476641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=476641"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=476641"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=476641"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=476641"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=476641"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=476641"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=476641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}