{"type":"document","data":{"id":"f89e1a6d-fe3a-47d8-b3e5-e778fac41131","localeString":"en-GB","publishDate":"2024-03-19T17:02:07.797+01:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Avoid being taken hostage by cybercriminals thanks to tips from our experts."},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"I protect my business","subtitle":"Avoid being taken hostage by cybercriminals thanks to tips from our experts"},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"Secure business"}},"date":"2024-03-19","readingTime":5},"flexZone":{"flexComponents":[{"componentType":"paragraph","richBody":{"value":"<p></p>"},"alignedImage":{"position":"top","transformBaseUrl":"https://assets.ing.com/transform/29a371fd-c819-403d-a7ae-3bac05a29854/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance","original":"https://assets.ing.com/m/1f344e19bf9a57ce/original/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance.jpg","extension":"jpg"}},{"componentType":"highlight","title":"Protect your company against cybercriminals? Yes, you can!","richBody":{"value":"<p>Follow our cybersecurity trainings and close the door to cybercriminals</p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-trainings","text":"Discover the details and register now"}]},{"componentType":"sectionTitle","title":"How is your cybersecurity?"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span><span>Whether you’re a start-up or a small or medium-sized company, you can formulate your own cyber security strategy.</span></span></span> <span><span><span>By developing a strategy for cybersecurity and training your staff from the outset, you can reduce the risks and protect your business.</span></span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/cybersecurity-strategy","text":"Your company’s general state of readiness"}]},{"componentType":"sectionTitle","title":"Corporate cyber hygiene"},{"componentType":"paragraph","richBody":{"value":"<p>Cyber hygiene is a set of practices and measures put in place to provide IT security to the organisation. These are explained to employees and observed by them in the course of their work. </p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-cyber-hygiene","text":"Most important elements of corporate cyber hygiene"}]},{"componentType":"sectionTitle","title":"The cyber security response plan"},{"componentType":"paragraph","richBody":{"value":"<p>All companies should have a cyber security response plan. Certainly, because the creation of this plan forces us to think about possible incidents and start preparing for them. But even more so because this plan will save time and therefore reduce the impact of a cyber-attack the day it happens. </p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-reaction-plan","text":"Create a response plan tailored to your needs"}]},{"componentType":"sectionTitle","title":"Raise awareness among your employees and key players within your company"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span>They’re the “human firewall”, let’s say. By alerting your employees and key players within your organisation to online security, you can significantly reduce the risk of viruses or data leaks.</span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/cyber-awareness-employees","text":"Some basic principles to help you raise the awareness of your teams"}]},{"componentType":"sectionTitle","title":"Protect yourself against ransomware"},{"componentType":"paragraph","richBody":{"value":"<p>Ransomware has become a major threat to individuals and organisations. These malicious programs encrypt their victims&apos; files and demand a ransom to decrypt them. To avoid being trapped by ransomware, it is essential to put a checklist of preventive actions in place.</p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-ransomware-checklist","text":"Guard yourself against ransomware attacks and protect your valuable data"}]}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting!"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Financial fraud","body":"Our experts’ advice on protecting your company's funds","image":{"transformBaseUrl":"https://assets.ing.com/transform/216e65cf-c100-4d8d-849b-b7752ebe75d3/Female-nurse-inputing-medical-data-into-computer","type":"image","width":5700,"altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/7fc7c6c460b89a3d/original/Female-nurse-inputing-medical-data-into-computer.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/financial-fraud-business"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Data protection","body":"Your company's data under lock and key for cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/fc9603fa-80b2-4d1b-9354-9c1992ff3eb9/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it","type":"image","width":5616,"altTextEN":"\"","altTextNL":"\"","altTextFR":"\"","altTextDE":"\"","original":"https://assets.ing.com/m/68957aad44d2466e/original/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it.jpg","extension":"jpg"},"date":"2023-05-10","link":{"url":"/en/business/news/secure-business/protect-business-data"}}]}]}}}