Cyber4Z in short

Cyber4Z started in 2015 with two specialists experienced in the cybersecurity domain. We now have a team with various capabilities in the field of strategic and tactical design of cyber security, IT, Privacy and Blockchain technology.

In addition, we are involved in technical and tactical implementations of complex security challenges that focus on the acceptance of new technologies in a pragmatic way. With our expertise and experience, we can guarantee the business objectives of our clients. These are widely determined by laws and regulations, customer requirements and rules of compliance.

  • Predict

  • Prevent

  • Detect

  • Respond

  • Remediate

Who are we?

Our team consists of certified professionals. Quality is our top priority. The technical and tactical implementations we deliver from the strategic design can be externally certified against the ISO9001, ISO27001, NEN7510 or other standards. Therewith we can have our quality tested externally as well. In addition, we provide operational knowledge when it comes to technical security assessments such as penetration tests, project management, SOC / SIEM propositions with connecting services such as log management, vulnerability and compliance management, patch management, training in the field of privacy, security and blockchain technology.

More about Cyber4Z

Our clients


Monthly Cybernote: November 2022


CISA and FBI come up with step-by-step plan to combat DDoS attacks

Distributed denial-of-service (DDoS) attacks can have major consequences for organizations in terms of time, money and reputation damage, according to the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA). The US government agencies therefore have a roadmap that organizations can use to prevent or limit their impact.

DDoS attacks aim to overload a network server with requests to connect to the server, causing the server to crash and users to lose access. This can cause major disruptions for organizations and businesses. Such attacks can last for several minutes or even several days. This means, for example, that a website cannot be loaded by visitors.

According to the FBI and CISA, the first thing to do is to map the essential services and systems and how users connect to them. It is also recommended to implement an anti-DDoS service and it must be known which measures the used internet provider and cloud providers have taken. Another part of the action plan is the preparation of a DDoS response plan and a DDoS business continuity plan.

When organizations think they are dealing with a DDoS attack, the FBI and CISA advise to confirm this first and to approach their own internet provider. Subsequently, mitigating measures must be rolled out and the network must be actively monitored. In addition, the FBI and CISA also make recommendations for setting up the firewall. Once the attack is over, the FBI asks that the attack is reported to them and organizations can adjust their response plan to improve response to future attacks.

Source: CISA.gov, October 2022.