Privacy by design

You collect data for your research or for your work. A name here, an address there. But do you really need all that data? And does everyone know what you...

Read article
Protect your privacy

Data breaches

You clicked on the wrong button by accident, and inadvertently sent a file with payment details to all of your clients. A colleague lost his USB stick. Someone came across...

Read article
Protect your privacy

Strong passwords

Half a millisecond. That's the average time it takes a hacker to crack a weak password like '123456' or 'password'. And passwords that consist of actual words or birth dates...

Read article
Protect yourself
Bescherm je gegevens

Unencrypted data

You fire off a quick email to confirm an appointment or to share a file. But how do you know your data won’t be looted? Are you sure it is...

Read article
Protect yourself

Data confiscation abroad

When you go on holiday, you take all your valuables with you. These days, everything you need to run your day-to-day life, your memories and expertise are stored on your...

Read article
Protect yourself

Internet of things

Your coffee is ready when you wake up, there’s a message on your phone to say the washing is done and the thermostat knows when and how much to heat...

Read article
Protect yourself

Cyberbullying

It’s so easy to circulate an embarrassing photo or post a hurtful comment from behind a desk. Worse still, malicious words may be sent directly to the intended victim to keep...

Read article
Recognize cybercrime

Recognize fake websites

You’re looking for information about a product. You click and read and then click again. The next day, you find you can't log in. Pre-occupied with your search, you didn't...

Read article
Protect yourself

Privacy and mobile apps

An app which shares your photos with friends, orders your dinner and measures your sporting achievements. And then there’s one with funny sounds. The game that you've already finished. And...

Read article
Protect your privacy