Information Security

Information Security at BIT

At BIT, we prioritise safety and availability—this is reflected in how we deliver our services and in our team’s mindset. Information security is ingrained in our DNA. When people think of information security, they often focus on protecting data from unauthorised access (confidentiality). However, two other aspects are equally critical: availability (is the information accessible when needed?) and integrity (is the data accurate and complete?).

ISO/IEC 27001 and NEN 7510 Certified

At BIT, we don’t just talk the talk—we walk the walk. That’s why we’ve had our information security measures certified to ISO standards. ISO/IEC 27001 is the international benchmark for information securit, focusing on developing, implementing, monitoring, and improving an Information Security Management System (ISMS). This ensures information security remains a continuous priority, driving ongoing organisational learning and enhancement.

BIT’s entire service portfolio is ISO/IEC 27001 certified—covering not just data centre services but also network, email, hosting, and management solutions.

In addition to ISO/IEC 27001, BIT’s services are also NEN 7510 certified. This Dutch standard specifies information security requirements for healthcare, ensuring the confidentiality, integrity, and availability of patient data.

Your Security Measures

For clients managing their own IT infrastructure, understanding threats and defences is crucial. Below, we’ve outlined key steps to strengthen your information security.

Firewall

Connecting to the internet? A firewall is essential to block unwanted traffic. Most operating systems include a built-in firewall, but third-party options (free or paid) often offer advanced features. Ensure your firewall is active and regularly updated.

Viruses

Viruses spread rapidly online and can cause significant damage. Always use an up-to-date antivirus scanner with automatic updates. Free options like AVG and Avast are available, but many others suit different needs.

Since many viruses spread via email, we strongly recommend using BIT’s email virus scanners.

Spam

Spam is a major nuisance, but BIT’s spam filters block most of it. To further reduce spam:

  • Avoid sharing your email address publicly on websites or forums.
  • Never respond to spam or click ā€œunsubscribeā€ links—this often confirms your address is active.
  • Report spam. For Dutch spam, file a complaint at spamklacht.nl.

Phishing

Phishing scams mimic legitimate sites (e.g., banks or email providers) to steal login or payment details. Stay vigilant:

  • Question unexpected requests and verify with the organisation if unsure.
  • Check URLs for https:// and a padlock icon — click the padlock to verify the certificate.
  • Use updated browsers with phishing blacklists enabled.

Trojans

Trojans disguise themselves as harmless files (e.g., games or screensavers) but grant attackers remote control. Many antivirus tools miss them, so consider dedicated Trojan scanners.

Spyware

Spyware secretly monitors your activity, stealing passwords or financial data. Free tools like Ad-Aware or SpywareBlaster can detect and remove it.

Identity Theft

Identity theft involves stealing personal/business data (logins, credit cards) to impersonate you. Protect yourself by:

  • Sharing sensitive information sparingly.
  • Securing devices with stronginformation security measures.

Wireless Networks

Poorly configured Wi-Fi can be exploited by criminals. Use WPA encryption (avoid weak WEP/MAC filtering). For guidance, consult GovCert’s factsheet on securing wireless networks.

Passwords

  • Use strong passwords with upper/lowercase letters, numbers, and symbols.
  • Avoid reusing passwords across services.
  • Change passwords periodically.

Operating System

Regular updates and patches close security gaps. Enable automatic updates to protect against viruses, Trojans, and other threats.

Botnets and Zombies

A botnet is a network of infected computers (ā€œzombiesā€) controlled remotely for spam or attacks. Keep your system updated and scan regularly for malware.