Information Security
Information Security at BIT
At BIT, we prioritise safety and availabilityāthis is reflected in how we deliver our services and in our teamās mindset. Information security is ingrained in our DNA. When people think of information security, they often focus on protecting data from unauthorised access (confidentiality). However, two other aspects are equally critical: availability (is the information accessible when needed?) and integrity (is the data accurate and complete?).
ISO/IEC 27001 and NEN 7510 Certified
At BIT, we donāt just talk the talkāwe walk the walk. Thatās why weāve had our information security measures certified to ISO standards. ISO/IEC 27001 is the international benchmark for information securit, focusing on developing, implementing, monitoring, and improving an Information Security Management System (ISMS). This ensures information security remains a continuous priority, driving ongoing organisational learning and enhancement.
BITās entire service portfolio is ISO/IEC 27001 certifiedācovering not just data centre services but also network, email, hosting, and management solutions.
In addition to ISO/IEC 27001, BITās services are also NEN 7510 certified. This Dutch standard specifies information security requirements for healthcare, ensuring the confidentiality, integrity, and availability of patient data.
Your Security Measures
For clients managing their own IT infrastructure, understanding threats and defences is crucial. Below, weāve outlined key steps to strengthen your information security.
Firewall
Connecting to the internet? A firewall is essential to block unwanted traffic. Most operating systems include a built-in firewall, but third-party options (free or paid) often offer advanced features. Ensure your firewall is active and regularly updated.
Viruses
Viruses spread rapidly online and can cause significant damage. Always use an up-to-date antivirus scanner with automatic updates. Free options like AVG and Avast are available, but many others suit different needs.
Since many viruses spread via email, we strongly recommend using BITās email virus scanners.
Spam
Spam is a major nuisance, but BITās spam filters block most of it. To further reduce spam:
- Avoid sharing your email address publicly on websites or forums.
- Never respond to spam or click āunsubscribeā linksāthis often confirms your address is active.
- Report spam. For Dutch spam, file a complaint at spamklacht.nl.
Phishing
Phishing scams mimic legitimate sites (e.g., banks or email providers) to steal login or payment details. Stay vigilant:
- Question unexpected requests and verify with the organisation if unsure.
- Check URLs for https:// and a padlock icon ā click the padlock to verify the certificate.
- Use updated browsers with phishing blacklists enabled.
Trojans
Trojans disguise themselves as harmless files (e.g., games or screensavers) but grant attackers remote control. Many antivirus tools miss them, so consider dedicated Trojan scanners.
Spyware
Spyware secretly monitors your activity, stealing passwords or financial data. Free tools like Ad-Aware or SpywareBlaster can detect and remove it.
Identity Theft
Identity theft involves stealing personal/business data (logins, credit cards) to impersonate you. Protect yourself by:
- Sharing sensitive information sparingly.
- Securing devices with stronginformation security measures.
Wireless Networks
Poorly configured Wi-Fi can be exploited by criminals. Use WPA encryption (avoid weak WEP/MAC filtering). For guidance, consult GovCertās factsheet on securing wireless networks.
Passwords
- Use strong passwords with upper/lowercase letters, numbers, and symbols.
- Avoid reusing passwords across services.
- Change passwords periodically.
Operating System
Regular updates and patches close security gaps. Enable automatic updates to protect against viruses, Trojans, and other threats.
Botnets and Zombies
A botnet is a network of infected computers (āzombiesā) controlled remotely for spam or attacks. Keep your system updated and scan regularly for malware.