<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Event Archives - KeyTech</title>
	<atom:link href="https://www.keytech.be/en/category/event/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.keytech.be/en/category/event/</link>
	<description>Digital innovation with a human touch</description>
	<lastBuildDate>Tue, 09 Apr 2024 13:44:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Safest, festival voor veilig onderwijs</title>
		<link>https://www.keytech.be/en/safest-veilig-onderwijs-festival/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 13:44:40 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/safest-veilig-onderwijs-festival/</guid>

					<description><![CDATA[<p>Onze cybercrime expert Erik Steenhouwer zal op 13 mei 2024 een presentatie geven op de "Safest" festival in AP Hogeschool Antwerpen.</p>
<p>The post <a href="https://www.keytech.be/en/safest-veilig-onderwijs-festival/">Safest, festival voor veilig onderwijs</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Ontdek de digitale duisternis!</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-1" style="--awb-content-alignment:justify;"><p>Onze cybercrime expert <strong>Erik Steenhouwer</strong> zal op <strong>13 mei 2024</strong> een presentatie geven op de &#8220;<a href="https://www.ictdag.be/45/aanbod/sessie/27" target="_blank" rel="noopener"><strong>Safest</strong></a>&#8221; festival in AP Hogeschool Antwerpen.</p>
<p>Studenten en onderwijzers worden er ongedompeld in een opwindende fictie over de modus operandi van cybercriminelen, waarin elke gelijkenis met recente gebeurtenissen geen louter toeval is.</p>
<p><a href="https://www.ictdag.be/45/aanbod/inschrijven" target="_blank" rel="noopener">Schrijf hier in!</a></p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-image-element " style="text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none"><a class="fusion-no-lightbox" href="https://www.ictdag.be/45/aanbod/sessie/27" target="_blank" aria-label="GIQwmxiW8AECrmT" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" width="800" height="493" src="https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-800x493.jpeg" alt class="img-responsive wp-image-3165" srcset="https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-200x123.jpeg 200w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-400x247.jpeg 400w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-600x370.jpeg 600w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-800x493.jpeg 800w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-1200x740.jpeg 1200w" sizes="(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px" /></a></span></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-text fusion-text-2"><h3>Inleiding</h3>
<p>Wij dompelen je onder in een opwindende fictie over de modus operandi van cybercriminelen.</p>
<h3></h3>
<h3>Inhoud</h3>
<p>Sommige films of series trekken bij de eerste seconden al onze aandacht omdat de eerste scène meteen het einde van het verhaal onthult, wat ons nieuwsgierig maakt naar wat vooraf ging.</p>
<p>De eerste scène in onze fictie is een real-time uitvoering van een echte * ransomware aanval op een geïsoleerde omgeving.</p>
<p>Zoals steeds reist de vraag bij het slachtoffer : hoe zijn we in deze schokkende situatie terechtgekomen en welke acties gingen hieraan vooraf?</p>
<p>Hier komt de magie tot leven, we bieden je de gelegenheid om de digitale tijd terug te draaien.</p>
<p>We pikken uit de verschillende mogelijke scenario’s een paar uit met telkens demonstraties van de sleutelmomenten die het verhaal beïnvloed hebben en de technische en gedragsmatige maatregelen die we hadden kunnen treffen om de aanval te blokkeren en het scenario te herschrijven met een happy ending.</p>
<h3></h3>
<h3>Resultaat</h3>
<p>Na deze sessie zal je via onthutsende demonstraties onuitwisbare inzichten meenemen over je kwetsbaarheden, samen met essentiële reflexen die je in staat zullen stellen om veiliger te navigeren in de digitale wereld van vandaag.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/en/safest-veilig-onderwijs-festival/">Safest, festival voor veilig onderwijs</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Discover a &#8220;real ransomware attack&#8221; from build to deployment</title>
		<link>https://www.keytech.be/en/cybernoon-appetizers-a-real-ransomware-scenario-from-build-to-deployment/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 Feb 2023 13:21:54 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=2810</guid>

					<description><![CDATA[<p>Learn how to better protect yourself and your business against sophisticated cyberattacks and ransomware.</p>
<p>The post <a href="https://www.keytech.be/en/cybernoon-appetizers-a-real-ransomware-scenario-from-build-to-deployment/">Discover a &#8220;real ransomware attack&#8221; from build to deployment</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;"><p>Learn how to adopt the right behavioral and technical measures<br />
to obstruct a ramsomware in each phase of its lifecycle</p></h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-3 awb-text-cols fusion-text-columns-2 fusion-no-small-visibility fusion-no-medium-visibility" style="--awb-content-alignment:justify;--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:100px;"><p>Register to our <strong>Cybernoon Appetizers</strong> (<em>from 12:00 to 12:30</em>) and enjoy <strong>10 coaching sessions of 30 minutes</strong> from a cybersecurity expert (20 min. presentation + 10 min. Q&amp;A).</p>
<p>Price per participant for the 10 sessions : <strong>2</strong><strong>0</strong><strong>0 € VAT excl.</strong> (<em>invoiced</em>)</p>
<p>Target audience: Whatever your profile (manager or employee) or technical background (IT person or not), everyone will remember valuable tips during each cycle of the stunning attack demonstration.</p>
<p><strong>No product pitching!</strong></p>
<p>The trainings will take place in English but you can ask your questions in French or Dutch during the Q&amp;A section.</p>
<p>For each session, a <strong>Teams</strong> <strong>link </strong>will be sent to you <strong>2 days in advance</strong>.<br />
After each session a link to the powerpoint slides will be sent to all registrants, weather they have followed it or not, however they will not be recorded.</p>
<p>To ensure the quality of the bandwidth and give everyone the opportunity to ask questions, registrations are <strong>limited to 25 persons</strong>, but you will be informed about the next series in May and June if you were too late to register for this one.</p>
</div><div class="fusion-text fusion-text-4 fusion-no-large-visibility" style="--awb-content-alignment:center;"><p>Register to our <strong>Cybernoon Appetizers</strong> (<em>from 12:00 to 12:30</em>) and enjoy <strong>10 coaching sessions of 30 minutes</strong> from a cybersecurity expert (20 min. presentation + 10 min. Q&amp;A).</p>
<p>Price per participant for the 10 sessions : <strong>2</strong><strong>0</strong><strong>0 € VAT excl.</strong> (<em>invoiced</em>)</p>
<p>Target audience: Whatever your profile (manager or employee) or technical background (IT person or not), everyone will remember valuable tips during each cycle of the stunning attack demonstration.</p>
<p><strong>No product pitching!</strong></p>
<p>The trainings will take place in English but you can ask your questions in French or Dutch during the Q&amp;A section.</p>
<p>For each session, a <strong>Teams</strong> <strong>link </strong>will be sent to you <strong>2 days in advance</strong>.<br />
After each session a link to the powerpoint slides will be sent to all registrants, weather they have followed it or not, however they will not be recorded.</p>
<p>To ensure the quality of the bandwidth and give everyone the opportunity to ask questions, registrations are <strong>limited to 25 persons</strong>, but you will be informed about the next series in May and June if you were too late to register for this one.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Line Up #SeasonOne</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-10 fusion-content-boxes-1 content-boxes-timeline-horizontal content-left content-boxes-icon-on-top content-boxes-timeline-layout fusion-delayed-animation" style="--awb-backgroundcolor:var(--awb-color2);--awb-hover-accent-color:var(--awb-custom_color_2);--awb-circle-hover-accent-color:transparent;" data-animation-delay="350" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/darksideoftheweb.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#1 The dark side of the force</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>The cybercrime business model on the dark web</p>
<p><strong>21 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/ransomware-pc.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#2 Ransomware illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>The lifecycle of a ransomware from build to deployment</p>
<p><strong>23 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-3 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/suicidebunnies.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#3 Suicide bunnies</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>&#8220;Suicide bunnies&#8221; exposing a big attack/vulnerability surface</p>
<p><strong>28 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-4 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/trojanhorse.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#4 Trojan horses illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>From myth to malwares (malicious software, files, devices, …)</p>
<p><strong>30 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-5 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/anobotnet.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#5 Hidden exploits illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>When your computer becomes part of a botnet &#8230;</p>
<p><strong>4 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-6 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/socialnetworkinvasion.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#6 Privacy invasion</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Reduce your fingerprint!</p>
<p><strong>6 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-7 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/credentials.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#7 Password cracking</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Hackers mostly don’t need to break in, when they can just login</p>
<p><strong>11 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-8 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/phishingscam.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#8 Phish' &amp; Scam</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Sophisticated phishing and social engineering techniques in 2023</p>
<p><strong>13 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-9 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/sniffing.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#9 Sniffing illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Prevent your sensitive data from being intercepted</p>
<p><strong>18 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-10 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/passwordmanagement.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#10 Data breaches</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Protect yourself against data breaches</p>
<p><strong>20 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div class="fusion-clearfix"></div></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-bottom:35px;width:100%;"></div><div style="text-align:center;"><a class="fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type" target="_self" href="#" data-toggle="modal" data-target=".fusion-modal.cybersnack_signup_en"><span class="fusion-button-text awb-button__text awb-button__text--default">SIGN UP NOW</span></a></div><div class="fusion-modal modal fade modal-1 cybersnack_signup_en" tabindex="-1" role="dialog" aria-labelledby="modal-heading-1" aria-hidden="true" style="--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);"><div class="modal-dialog modal-lg" role="document"><div class="modal-content fusion-modal-content"><div class="modal-header"><button class="close" type="button" data-dismiss="modal" aria-hidden="true" aria-label="Close">&times;</button><h3 class="modal-title" id="modal-heading-1" data-dismiss="modal" aria-hidden="true">Registration for our series of 10 cybersecurity coachings (30 min.)</h3></div><div class="modal-body fusion-clearfix">
<p>Price: <strong>200 € VAT excl.</strong> (<em>invoiced to your company</em>) per participant for the 10 sessions</p>
<div class="fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-2859" style="--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;" data-form-id="2859" data-config="{&quot;form_id&quot;:2859,&quot;form_post_id&quot;:2859,&quot;post_id&quot;:2810,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;company&quot;:&quot;text&quot;,&quot;vatnumber&quot;:&quot;text&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}"><form action="https://www.keytech.be/en/cybernoon-appetizers-a-real-ransomware-scenario-from-build-to-deployment/" method="post" class="fusion-form fusion-form-2859"><div class="fusion-fullwidth fullwidth-box fusion-builder-row-2-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2859"><input type="text" autocomplete="off" name="firstname" id="firstname" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Firstname *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2859"><input type="text" autocomplete="off" name="lastname" id="lastname" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Lastname *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-email-field fusion-form-label-above" style="" data-form-id="2859"><input type="email" autocomplete="off" name="email" id="email" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Email *" data-holds-private-data="false"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2859"><input type="text" autocomplete="off" name="company" id="company" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Company *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2859"><input type="text" autocomplete="off" name="vatnumber" id="vatnumber" value=""  class="fusion-form-input" placeholder="VAT number (BE xxxx.xxx.xxx) " data-holds-private-data="false" minlength="10" maxlength="15"/></div><div class="fusion-form-field fusion-form-submit-field fusion-form-label-above" style="" data-form-id="2859"><div class="fusion-button-wrapper fusion-aligncenter"><button type="submit" class="fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span  button-default form-form-submit" style="--awb-margin-bottom:30px;" data-form-number="2859" tabindex=""><span class="fusion-button-text awb-button__text awb-button__text--default">Register</span></button></div></div><div class="fusion-form-field fusion-form-recaptcha-field fusion-form-label-above" style="" data-form-id="2859">				<div class="form-creator-recaptcha" >
																							<div class="fusion-form-recaptcha-wrapper">
										<div
							id="g-recaptcha-id-form-2859"
							class="fusion-form-recaptcha-v3 recaptcha-container "
							data-sitekey="6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue"
							data-badge="inline">
						</div>
						<input
							type="hidden"
							name="fusion-form-recaptcha-response"
							class="g-recaptcha-response"
							id="fusion-form-recaptcha-response-2859"
							value="">
									</div>
															</div>
				</div><div class="form-submission-notices data-notice_1" id="fusion-notices-1" data-instance="1"><div class="fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed" role="alert"><div class="fusion-alert-content-wrapper"><span class="alert-icon"><i class="awb-icon-check-circle" aria-hidden="true"></i></span><span class="fusion-alert-content">Thank you for your registration. It has been sent.</span></div><button type="button" class="close toggle-alert" data-dismiss="alert" aria-label="Close">&times;</button></div><div class="fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed" role="alert"><div class="fusion-alert-content-wrapper"><span class="alert-icon"><i class="awb-icon-exclamation-triangle" aria-hidden="true"></i></span><span class="fusion-alert-content">There was an error trying to send your registration. Please try again later.</span></div><button type="button" class="close toggle-alert" data-dismiss="alert" aria-label="Close">&times;</button></div></div></div></div></div></div><input type="hidden" name="fusion_privacy_store_ip_ua" value="true"></form></div>
</div></div></div></div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/en/cybernoon-appetizers-a-real-ransomware-scenario-from-build-to-deployment/">Discover a &#8220;real ransomware attack&#8221; from build to deployment</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacking: the new normal?</title>
		<link>https://www.keytech.be/en/hacking-the-new-normal/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 05 Oct 2022 21:34:48 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=2565</guid>

					<description><![CDATA[<p>Onze CEO, Erik Steenhouwer, zal aanwezig zijn op Digitalize Flanders voor een toespraak over hacking methodes.</p>
<p>The post <a href="https://www.keytech.be/en/hacking-the-new-normal/">Hacking: the new normal?</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Hacking: the new normal?</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-5"><p>Onze CEO, Erik Steenhouwer, zal aanwezig zijn op <a href="https://www.digitalizeflanders.be/guest/erik-steenhouwer/" target="_blank" rel="noopener">Digitalize Flanders</a> voor een toespraak over hacking methodes.</p>
<p><a href="https://www.digitalizeflanders.be/"><img decoding="async" class="alignnone wp-image-2574 size-fusion-800" src="https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-800x257.jpg" alt="" width="800" height="257" srcset="https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-200x64.jpg 200w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-300x96.jpg 300w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-400x128.jpg 400w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-600x193.jpg 600w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-768x246.jpg 768w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-800x257.jpg 800w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-1024x329.jpg 1024w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders.jpg 1200w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>Aarzel niet om ons te vervoegen! Meer informatie <a href="https://www.digitalizeflanders.be/guest/erik-steenhouwer/" target="_blank" rel="noopener">hier</a>.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Digitalize Flanders &#8211; 20 &amp; 21 oktober 2022 @ Antwerp Expo</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-6"><p>Tijdens deze keynote ontdek je dat de meeste hackers geen mysterieuze tovenaars zijn die vanuit hun donkere kamer met een kap over hun hoofd en gebogen achter hun PC groene teksten typen die dwars door de firewall van een bedrijf breken.</p>
<p>Vaak zijn het gewone mensen die op winstbejag uit zijn en bij gebrek aan technische expertise bestaande geautomatiseerde tools op het dark web gebruiken of youtube tutorials volgen om kwetsbaarheden uit te buiten.</p>
<p>Via deze andere inkijk op de modus operandi van hackers ontdek je welke de meest voorkomende misvattingen zijn en hoe sommige simpele voorzorgen nog steeds een doeltreffende bescherming bieden.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/en/hacking-the-new-normal/">Hacking: the new normal?</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How do you protect yourself from cybercrime?</title>
		<link>https://www.keytech.be/en/learning-snacks-cybersecurity/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 19 Oct 2021 08:41:02 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=2636</guid>

					<description><![CDATA[<p>In deze Learning Snack legt onlineveiligheidsexpert Erik Steenhouwer uit waarom cybercriminaliteit in opmars is en hoe je je ertegen wapent.</p>
<p>The post <a href="https://www.keytech.be/en/learning-snacks-cybersecurity/">How do you protect yourself from cybercrime?</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Learning Snacks: Hoe bescherm je jezelf tegen cybercriminaliteit?</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-7"><p>In deze Learning Snack legt onlineveiligheidsexpert Erik Steenhouwer uit waarom cybercriminaliteit in opmars is en hoe je je ertegen wapent.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;"></div><div class="fusion-video fusion-youtube" style="--awb-max-width:842px;--awb-max-height:474px;--awb-align-self:center;--awb-width:100%;"><div class="video-shortcode"><lite-youtube videoid="ETdGyVu1Lws" class="landscape" params="wmode=transparent&autoplay=1&amp;enablejsapi=1" title="YouTube video player 1" data-button-label="Play Video" width="842" height="474" data-thumbnail-size="auto" data-no-cookie="on"></lite-youtube></div></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:15px;width:100%;"></div><div class="fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Waarom cybercriminaliteit in opmars is</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-8"><p>Cybercriminaliteit is zeker geen nieuw fenomeen, maar is de laatste jaren wel exponentieel toegenomen. Zo ben je tegenwoordig met <strong>verschillende apparaten</strong> (tv, smartphone, alarminstallatie, webcam …) verbonden via het internet. Een zwakke beveiliging van een van die toestellen betekent een gevaar voor je hele online omgeving – en dus je persoonlijke gegevens.</p>
<p>Daarnaast biedt cybercriminaliteit een <strong>interessant businessmodel</strong>. Via het <i>dark web</i> kunnen criminelen anoniem te werk gaan en enorm veel geld in handen krijgen met een heel laag risico. Ook het cryptogeld waarmee ze transacties uitvoeren is zo goed als niet terug te brengen tot hun persoon.</p>
<p>Van GDPR-wetgeving tot en met slimme technologie: er bestaan heel wat hulpmiddelen om je te wapenen tegen cybercriminaliteit, maar <strong>één pasklare oplossing is er niet</strong>. Veel internetgebruikers beseffen bovendien niet dat ze ook een doelwit kunnen zijn en dat ze dus het best de nodige maatregelen treffen om geen slachtoffer van digitale misdaad te worden.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Waarom cybercriminaliteit ook voor jou een gevaar is</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-9"><p>Ook jij kwam meer dan waarschijnlijk al in contact met cybercriminaliteit, bewust of onbewust. Zo kreeg je misschien al eens een mail of sms waarin criminelen met een valse identiteit naar persoonlijke gegevens hengelen. Deze veelvoorkomende vorm van cybercriminaliteit heet <strong>phishing</strong>.</p>
<p>Connecteren met een onbeveiligd netwerk, je computer ontgrendeld achterlaten, naar een frauduleuze website surfen … Vaak ligt een eigen handeling rechtstreeks aan de basis van je beveiligingsprobleem. Maar soms zit de <strong>fout bij derden</strong>. Denk maar aan een webshop die door een datalek je gegevens te grabbel gooit. In beide gevallen zijn er gelukkig opties om jezelf te beschermen.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Hoe je je kan beschermen tegen cybercriminaliteit</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-10"><p>Zowel <strong>technologisch</strong> als <strong>gedragsmatig</strong> kan je maatregelen nemen tegen cybercriminaliteit. Zo zijn tools om je paswoorden versleuteld te beheren (bv. <a href="https://www.lastpass.com/" target="_blank" rel="noopener noreferrer">LastPass</a>) een sterke bescherming tegen datalekken op de websites van derden. Je wachtwoorden regelmatig wijzigen is dan weer een actie waarvoor je zelfdiscipline nodig hebt.</p>
<p>In <a href="https://www.cevora.be/nl/vind-je-opleiding?term=cybersecurity&amp;searchAs=EM&amp;languages=%5b%22nl%22%5d" target="_blank" rel="noopener">de opleidingen van Cevora</a> kom je te weten welke maatregelen het meest geschikt zijn voor de verschillende vormen van cybercriminaliteit.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/en/learning-snacks-cybersecurity/">How do you protect yourself from cybercrime?</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Event</title>
		<link>https://www.keytech.be/en/cyberevent-2020/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 21:26:24 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=125</guid>

					<description><![CDATA[<p>Awareness is the first step to action!</p>
<p>The post <a href="https://www.keytech.be/en/cyberevent-2020/">Cybersecurity Event</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-10 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:capitalize;--fontSize:38;line-height:1.4;">Cybersecurity Event &#8211; <em>17 September 2020</em></h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-11"><p style="text-align: center;">Reflecting on the success of this year we are driven to blow your mind next year!</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="awb-gallery-wrapper awb-gallery-wrapper-1 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-2px;--awb-aspect-ratio:1 / 1;--awb-object-position:49% 24%;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-4 fusion-columns-total-16 fusion-gallery-layout-grid fusion-gallery-1 has-aspect-ratio"><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-320x202.jpg" width="320" height="202" alt="" title="cyberevent11" aria-label="cyberevent11" class="img-responsive wp-image-1460 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-320x202.jpg" width="320" height="202" alt="" title="cyberevent12" aria-label="cyberevent12" class="img-responsive wp-image-1461 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-320x202.jpg" width="320" height="202" alt="" title="cyberevent13" aria-label="cyberevent13" class="img-responsive wp-image-1462 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-320x202.jpg" width="320" height="202" alt="" title="cyberevent14" aria-label="cyberevent14" class="img-responsive wp-image-1463 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-320x202.jpg" width="320" height="202" alt="" title="cyberevent15" aria-label="cyberevent15" class="img-responsive wp-image-1464 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-320x202.jpg" width="320" height="202" alt="" title="cyberevent16" aria-label="cyberevent16" class="img-responsive wp-image-1465 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-320x202.jpg" width="320" height="202" alt="" title="cyberevent1" aria-label="cyberevent1" class="img-responsive wp-image-1466 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-320x202.jpg" width="320" height="202" alt="" title="cyberevent2" aria-label="cyberevent2" class="img-responsive wp-image-1467 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-320x202.jpg" width="320" height="202" alt="" title="cyberevent3" aria-label="cyberevent3" class="img-responsive wp-image-1468 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-320x202.jpg" width="320" height="202" alt="" title="cyberevent4" aria-label="cyberevent4" class="img-responsive wp-image-1469 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-320x202.jpg" width="320" height="202" alt="" title="cyberevent5" aria-label="cyberevent5" class="img-responsive wp-image-1470 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-320x202.jpg" width="320" height="202" alt="" title="cyberevent6" aria-label="cyberevent6" class="img-responsive wp-image-1471 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-320x202.jpg" width="320" height="202" alt="" title="cyberevent7" aria-label="cyberevent7" class="img-responsive wp-image-1472 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-320x202.jpg" width="320" height="202" alt="" title="cyberevent8" aria-label="cyberevent8" class="img-responsive wp-image-1473 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-320x202.jpg" width="320" height="202" alt="" title="cyberevent9" aria-label="cyberevent9" class="img-responsive wp-image-1474 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-320x202.jpg" width="320" height="202" alt="" title="cyberevent10" aria-label="cyberevent10" class="img-responsive wp-image-1475 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div></div></div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/en/cyberevent-2020/">Cybersecurity Event</a> appeared first on <a href="https://www.keytech.be/en/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
