This blogpost is intended to help minimize the impact of a cyber attack. First, the process of a typical attack is shown. We then explain what the separation of networks means in theory. Finally, concrete practical measures are shown on how networks can be separated sensibly.
A large proportion of the security incidents that paralyse entire companies and organizations today originate in a malicious e-mail. As attackers become more sophisticated, the risk of becoming a victim of an e-mail cyberattack increases.
We don’t need to tell you that 2020 was a challenging year for emergency services on many fronts. While health professionals worked tirelessly to fight the outbreak of COVID-19, it soon became clear that hackers and other malicious online actors will not rest during this global crisis. The importance of cybersecurity for emergency organisations became clearer than ever before.