Back to blog

Misconceptions about data protection revealed: the truth about online security

"Data is the key to success." But poor data protection opens doors for hackers. On top of that, companies must stick to more and more rules when it comes to data protection. However, good data protection is not as complicated and impossible as it sounds. That is why we want to denounce some ineradicable statements here. Fact or myth?

1. Hackers are getting smarter every day, which makes data protection more difficult

Myth - Hackers are indeed getting smarter and companies do have more and more data to protect. But on the other hand, more and better ways to protect you from those hackers are arising. If you add additional layers of security and identification methods with the highest security level, no doubt you will be able defend yourself against cyber criminals.

2. Man is the weakest link

Fact – Even though implementation of the right security solutions is a good start, this is not enough to keep your data safe. Of course, you want to be able to trust that your data is protected because your employees handle your data with care. Yet, it is often human error that causes data breaches. Inform your staff about your system operation, but also about the risks of phishing and Smishing.

What is Smishing and how do you prevent it? Read more >

3. My employees are too smart to fall for phishing mails

Myth - For many employees, the concept of phishing is very well known, yet people still fall for these dangerous mails. Naivety, the idea "that will not happen to me" and a convincing counterfeited identity still get people to click on malicious links. The phishing example of the Dutch ABN AMRO bank is a great illustration of the realness of this threat.

4. My account is protected with a strong password

Myth - Although a strong password is of great importance, this is no longer sufficient to protect your company against cybercrime. Accounts that are only protected by a username and a password are an easy target for hackers. Make sure you add a second layer of authentication [Two-factor Authentication] to your login processes, in addition to a strong password. The user not only needs something he knows (the password) but also something that he has (for example, his phone to receive a login code). This way, you’ll significantly increase your online protection.

5. I’ll know straight away when my or my employee’s (online) identity has been stolen

Myth - Unfortunately, you won’t notice this right away. Sometimes it can take months for a company to notice a hack. Hackers do everything in their power to not be discovered. Consider the fact that, as a consumer, you probably won’t know your bank details have been stolen until money disappears. This also holds true for companies. Still, in the meantime all kinds of corrupt and harmful processes can run in the background.

6. I know exactly who I’m doing business with online

Myth - Consumers regularly provide inaccurate data in order to protect their online privacy. Address details, names, birth dates. How can you even know for sure their details are true? If you ask too many questions to your customers, this may lead to reluctance to share information. So, make sure that you only request the information that is valuable for your company. In addition, choose an identification process that gives you verified data, such as iDIN or itsme.

7. Hackers only focus on banks and financial institutions

Myth - Whether you are a financial institution or not, almost every company has something that’s of interest to hackers. Consider, for example, all data from your customers, but also privacy-sensitive data about your company. Think about contracts, names of prospects and partners or information about your processes or production. Or how about a piece of software you’ve invested a lot of time in developing? It’s not always about the money, but loss of these data can become expensive.

8. All hackers have bad intentions

Myth - No, luckily not all hackers are out to harm you or your company. Many large organisations employ hackers to detect weak spots in their systems and prevent problems. These ethical hackers can help you protect your data from those colleagues with less pleasant intentions.

Do you want to protect your company against hackers and cyber crime? Have a closer look at our security solutions and the possibilities for online identification. Or contact our specialist Thea van Oosterhout for more information.

Want to know more?

Contact Us

Want to know more?

Contact Us
connects tens of thousands of companies with millions of consumers via their mobile phone each day. Behind the scenes, from our innovative platform, CM makes sure companies can use these millions of messages, phone calls and payments to become part of people’s lives.

Is this region a better fit for you?

Apple Messages for Business
Scan & chat
Scan the code with your mobile phone to start chatting or use WhatsApp Web