Cyber4Z in short

Cyber4Z started in 2015 with two specialists experienced in the cybersecurity domain. We now have a team with various capabilities in the field of strategic and tactical design of cyber security, IT, Privacy and Blockchain technology.

In addition, we are involved in technical and tactical implementations of complex security challenges that focus on the acceptance of new technologies in a pragmatic way. With our expertise and experience, we can guarantee the business objectives of our clients. These are widely determined by laws and regulations, customer requirements and rules of compliance.

  • Predict

  • Prevent

  • Detect

  • Respond

  • Remediate

Who are we?

Our team consists of certified professionals. Quality is our top priority. The technical and tactical implementations we deliver from the strategic design can be externally certified against the ISO9001, ISO27001, NEN7510 or other standards. Therewith we can have our quality tested externally as well. In addition, we provide operational knowledge when it comes to technical security assessments such as penetration tests, project management, SOC / SIEM propositions with connecting services such as log management, vulnerability and compliance management, patch management, training in the field of privacy, security and blockchain technology.

More about Cyber4Z

Our clients

Monthly cybernote

Cyber security challenges for 2019

According to Venafi, the enormous information thefts at Dell, Marriott Group and RTL Netherlands are only the harbinger of a challenging 2019 for security managers and their teams. Security architect Justin Hansen sees three worrying challenges.

Information theft continues to increase due to unprotected equipment
Many organizations overlook an ever increasing number of risky entrances to cyber attacks, namely unprotected equipment. According to Business Insider, some 34 billion devices are connected to the Internet by 2020, which amounts to an average of more than four per person. All these devices and algorithms, containers and sensors in them have their own identity. While organizations spend more than eight billion dollars to protect the identities of their employees, they hardly invest in protecting machine identities. Because cyber criminals are aware of this, they devote more time and resources to attacking vulnerable or already compressed machine identities

Increasing shortage of cyberskills
Analysts predict a shortage of 1.8 million cyber security employees in 2022. This rapidly increasing scarcity creates a gap between organizations that can sufficiently invest in the required skills and tools and organizations that can not. The latter group gradually slips to a 'cyber poverty status', which makes them more likely to become the target of cyber criminals. That is dangerous for everyone, because such a weakly secured organization can be a partner of the more secure organizations. Unfortunately, the shortage of cybersecurity employees and skills is growing in parallel with an almost explosively increasing number of Internet-connected devices, machines and consumer products. The current digital transformation is much more based on equipment than on people, while machine identities are often insufficiently protected.

Tipping point in identity theft
In recent years, more and more people are becoming victims of cyber attacks for information and identity theft, so we are approaching a tipping point in its consequences. This trend also affects the credit assessment of people, because financial service providers and other organizations prefer not to have risky consumers as customers. Last year, the United States introduced the option for consumers to freeze their credits at no cost, as part of the partially reversed Dodd-Frank Act, but their focus is too much on the theft of personal identities. As a result, the consequences of insufficiently secured machine identities are ignored. Until organizations that manage and protect better, the number, size and impact of cyber attacks continue to increase!

Source: Infosecurity Magazine