- CyberVade's Weekly Scoop 🍦
- Posts
- CyberVade's Weekly Scoop 🍦
CyberVade's Weekly Scoop 🍦
Global avg. costs of data breach ⬆, a peek at Dutch Corporate Giants, a byte-sized cybersecurity MBA, and SOC in the spotlight
Hi there, this is CyberVade’s Weekly Scoop🍦, where we bring you Cybersecurity, AI, Data Privacy and Compliance knowledge updates.
Every issue, we’ll take you on a tour of the latest cybersecurity headlines (⚡️), throw in some witty analysis (🧠), serve up a mini cybersecurity MBA - because who doesn’t love a byte-sized brain boost? (🎓) And finally, shine a spotlight on one of CyberVade’s solutions to show how it can save the day ( 🚀).
In today’s edition, we’ve got the following for you:
⚡️Global avg. costs of data breach ⬆, DORA checklist 📝
Global average cost of a data breach increased 10%; driven by business disruption and post-customer support and remediation - Read the the 2024 edition of IBM’s annual report here
You’re now able to do a quick check if your (financial) organization complies to the EU Digital Operations Resiliency Act (DORA), which becomes effect Jan 17, 2025 - use the checklist created by the Dutch Market Conduct Authority (AFM)
🧠The Truly Engaged Dutch Companies are …..
This week, we're diving into the 25 AEX-index (Amsterdam Exchange) listed companies and their 2023 Annual Reports. We decided to play detective and perform a content analysis, hunting down a variety of keywords that scream "cybersecurity is important to us!".1
Think of it as a corporate game of "Where's Waldo?" but with a lot more jargon and a lot fewer striped shirts. We find out which companies are truly engaged with cybersecurity and which ones are just giving it a polite nod.
🏆 The Top 5 Truly Engaged are:
# | Company | Sector | Count of Keyword Mentions |
|---|---|---|---|
1 | Prosus | Communication Services | 182 |
2 | KPN | Communication Services | 161 |
3 | Aegon | Financial Services | 150 |
4 | Wolters Kluwer | Professional Services | 120 |
5 | ING Bank | Financial Services | 117 |
📍And those giving a Polite Nod are:
# | Company | Sector | Count of Keyword Mentions |
|---|---|---|---|
21 | Heineken | FMCG | 33 |
22 | Akzo Nobel | Specialty Chemicals | 19 |
23 | BE Semiconductor Industries | Semiconductor Industry | 18 |
24 | DSM | Health, Nutrition, and Materials | 11 |
25 | EXOR | Farm & Heavy Construction Machinery | 3 |
👉🏼What do we learn from this?
Turns out, the Communication- and Financial Services industries are really engaged with Cybersecurity. They’re like the Cybersecurity fan club we all wish we had.
Furthermore, even within the largest Dutch organizations engagement with Cybersecurity is like a buffet - some are really going for that second round, while others are barely taking a byte. It makes you wonder how the SMB’s are engaging with Cybersecurity (at least, it makes us wonder).
🎓 Cyber Threat Landscape
Welcome Cybersecurity 101. In this mini MBA series we distill essential cybersecurity knowledge into quick, digestible lessons 🍪 .
Think of it as a crash course in keeping your digital world safe, without the lengthy lectures. Today’s course: the Cyber Threat Landscape.
Cyber threats are becoming increasingly sophisticated, with ransomware attacks and phishing scams growing more prevalent and difficult to spot.
Recent trends highlight a rise in targeted attacks, where cybercriminals use advanced methods to exploit specific vulnerabilities. Small and medium-sized businesses are particularly vulnerable, as they often lack the resources for robust security measures.
The most frequent types of threats, including their countermeasures are:
Type of Threat | Description | Countermeasure |
|---|---|---|
Phishing | Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity | Email filtering, Security Awareness Training, MFA |
Ransomware | Malicious software that encrypts files and demands payment for decryption | Regular (cloud) backups, robust anti-malware tools, Security Awareness Training, Application whitelisting, Zero-Trust Architecture |
Malware | Software designed to damage or gain unauthorized access to systems | Updates antivirus, safe browsing, patching and system updates |
Data Breaches | Unautorized access to confidential data, often leading to data theft or leaks | Encryption, strong access controls, regular security audits, Data Loss Prevention tools, Network Segmentation |
DDoS Attacks | Distributed Denial of Service attacks overwhelm systems with traffic, causing service disruptions | DDoS protection services, network monitoring, traffic filtering |
Staying ahead of these threats requires regular updates to security protocols, ongoing team education, and a proactive approach to cybersecurity. By keeping informed and vigilant, you can better protect yourself and your organization from evolving cyber risks.
🚀 Security Operations Center (SOC)
In "Solution Spotlight” we highlight the CyberVade solutions protecting your data from cyber villains. Each edition introduces a new tool making waves, breaking down its features and benefits. Whether you're a pro or just starting, meet the tech superheroes keeping your digital world safe!
A Security Operations Center (SOC) is like your digital dashboard—monitoring all the flashing alerts and beeps to keep your data safe. Think of it as mission control for cyber threats, ensuring everything stays on course. It centralizes and streamlines an organization’s security system, tools, practices, and incident response.

Example of a SOC for illustrative purposes
The benefits of a SOC are vast and include:
Enhanced incident response
Enhanced Risk Detection
Improved Risk Management
Reduced Costs
Compliance
Business Continuity
Asset Protection
đź’ˇUseful tip, combining this tool with an EDR (Endpoint Detection and Response) tool is an effective duo of tools to benefit your organization!
1 We’ve used the frequency of keyword mentions as a proxy for how seriously the organization is taking cybersecurity. Think of it as a surface-level peek at the priorities, not an in-depth analysis.
