Organisational measures
The organisation of your cybersecurity is primarily based on the organisational measures you put in place to organise yourself within your company For example: limited liability company (SRL/BVBA), public limited company (SA/NV), cooperative society (CS/CV), etc. . So it doesn't require any particular investment, except for a little time and brainpower!
To achieve this and make it effective, as a business owner, you must ensure that you have the support of all your employees (if you have any), by informing them properly. You will gradually develop a culture of cybersecurity within your company For example: limited liability company (SRL/BVBA), public limited company (SA/NV), cooperative society (CS/CV), etc. because everyone will be aware of the importance of doing the right thing.
It is only by working together on a daily basis that you will be able to protect yourself from any cyber risk, even if the error remains human.
You will now go through the four themes of this first section (9 questions in all):
- Theme 1: Inventory and Analysis;
- Theme 2: Having the right procedures;
- Theme 3: Raising staff awareness;
- Theme 4: Assigning key roles.

-
Inventory and Analysis
In order to properly protect his castle and put up the right defence lines in the Middle Ages, a lord first had to delineate a protection perimeter and compile an inventory of the property and the people to be protected.
-
Having the Right Procedures: Make a Plan
Once you have taken stock of your situation by drawing up an inventory and doing the necessary analysis, you need to move on to the next step: making a plan.
-
Raising Awareness: Your Plan in Practice
You know your resources, you have analysed the enemy forces and developed your battle plan. But have you put all this into practice?
-
Assigning Key Roles: Allocate Responsibilities
Historically, for a human community to function effectively, roles are assigned to its various members, so that each has their own area of specialisation and responsibilities, therefore avoiding the risk of different parties performing the same tasks and stepping on each other's toes.
Technical measures
You have now reached the end of the first part of the Cyberscan on "Organisational Measures" to be implemented in your company For example: limited liability company (SRL/BVBA), public limited company (SA/NV), cooperative society (CS/CV), etc. . Well done!
You will now begin the second part, this time dedicated to "Technical Measures".
The aim is to go through the different technological tools (hardware and software) with you that you might use to defend your company For example: limited liability company (SRL/BVBA), public limited company (SA/NV), cooperative society (CS/CV), etc. and protect the personal data To put it simply, as soon as a natural person can be identified on the basis of these data, they are “personal” data. An IP address, a telephone number, the date and time of the visit to your website, etc. may therefore constitute personal data. you process.
Don't worry: "technical" does not necessarily mean "complicated"!
Four themes will once again follow in succession (7 questions in total):
- Theme 1: Defence System They are your various lines of cyber defence such as your firewall, anti-virus (anti-malware), etc. : Deploy the right tools;
- Theme 2: Backups: Back Up Your Data;
- Theme 3: Updating: Stay Prepared;
- Theme 4: Evaluate: Make the Most of Your Available Resources.
-
Defence System : Deploy the right tools
To protect themselves against intruders, societies in the past designed castles with moats, drawbridges, archers, etc. All these lines of defence enabled people to protect themselves and their property.
-
Backups: Back Up Your Data
A medieval lord could multiply as many lines of defence as possible and prepare himself as well as possible for an attack or an incident, but this never made his castle totally infallible.
-
Updating: Stay Prepared
After investing time, energy and money in securing his castle, a lord in the Middle Ages could feel protected within his walls. Enemies would no longer dare to attack.
-
Evaluate: Make the Most of Your Available Resources
Historically, for a human community to function effectively, roles are assigned to its various members, so that each has their own area of specialisation and responsibilities, therefore avoiding the risk of different parties performing the same tasks and stepping on each other's toes.