www.nfir.nl
Open in
urlscan Pro
2a01:7c8:f0:10c1::ffaa:627a
Public Scan
Submitted URL: https://search.app/zbfUEpnsNpRYfnMf9
Effective URL: https://www.nfir.nl/en/cyber-security-contracts/
Submission: On August 26 via manual from CO — Scanned from US
Effective URL: https://www.nfir.nl/en/cyber-security-contracts/
Submission: On August 26 via manual from CO — Scanned from US
Form analysis
3 forms found in the DOMGET https://www.nfir.nl/en/
<form class="elementor-search-form" action="https://www.nfir.nl/en/" method="get" data-hs-cf-bound="true">
<div class="elementor-search-form__container">
<label class="elementor-screen-only" for="elementor-search-form-2b665dcb">Search</label>
<input id="elementor-search-form-2b665dcb" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
<input type="hidden" name="lang" value="en">
<button class="elementor-search-form__submit" type="submit" aria-label="Search">
<div class="e-font-icon-svg-container"><svg class="fa fa-search e-font-icon-svg e-fas-search" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg">
<path
d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
</path>
</svg></div> <span class="elementor-screen-only">Search</span>
</button>
</div>
</form>
GET https://www.nfir.nl/en/
<form class="elementor-search-form" action="https://www.nfir.nl/en/" method="get" data-hs-cf-bound="true">
<div class="elementor-search-form__container">
<label class="elementor-screen-only" for="elementor-search-form-2b665dcb">Search</label>
<input id="elementor-search-form-2b665dcb" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
<input type="hidden" name="lang" value="en">
<button class="elementor-search-form__submit" type="submit" aria-label="Search">
<div class="e-font-icon-svg-container"><svg class="fa fa-search e-font-icon-svg e-fas-search" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg">
<path
d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
</path>
</svg></div> <span class="elementor-screen-only">Search</span>
</button>
</div>
</form>
POST /en/cyber-security-contracts/#gf_13
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_13" id="gform_13" class="vereist-veld recaptcha-v3-initialized" action="/en/cyber-security-contracts/#gf_13" data-formid="13" novalidate="" data-hs-cf-bound="true">
<div class="gf_invisible ginput_recaptchav3" data-sitekey="6LfmaGsbAAAAAGsZNz38-fzIwXHnLNIyJu3EFl9r" data-tabindex="0"><input id="input_f0f979ac39cfb1adbcbbd07077fac107" class="gfield_recaptcha_response" type="hidden"
name="input_f0f979ac39cfb1adbcbbd07077fac107" value=""></div>
<div class="gform-body gform_body">
<div id="gform_fields_13" class="gform_fields top_label form_sublabel_above description_below validation_below">
<fieldset id="field_13_7" class="gfield gfield--type-name gfield--width-full naam-formulier gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_below field_validation_below gfield_visibility_visible"
data-js-reload="field_13_7">
<legend class="gfield_label gform-field-label gfield_label_before_complex">Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></legend>
<div class="ginput_complex ginput_container ginput_container--name no_prefix has_first_name has_middle_name has_last_name no_suffix gf_name_has_3 ginput_container_name gform-grid-row" id="input_13_7">
<span id="input_13_7_3_container" class="name_first gform-grid-col gform-grid-col--size-auto">
<input type="text" name="input_7.3" id="input_13_7_3" value="" aria-required="true" placeholder="First name">
<label for="input_13_7_3" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">First name</label>
</span>
<span id="input_13_7_4_container" class="name_middle gform-grid-col gform-grid-col--size-auto">
<input type="text" name="input_7.4" id="input_13_7_4" value="" aria-required="false" placeholder="Insert">
<label for="input_13_7_4" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">Insert</label>
</span>
<span id="input_13_7_6_container" class="name_last gform-grid-col gform-grid-col--size-auto">
<input type="text" name="input_7.6" id="input_13_7_6" value="" aria-required="true" placeholder="Last name">
<label for="input_13_7_6" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">Last name</label>
</span>
</div>
</fieldset>
<div id="field_13_5" class="gfield gfield--type-text gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_5">
<label class="gfield_label gform-field-label" for="input_13_5">Company name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_5" id="input_13_5" type="text" value="" class="large" placeholder="Company name" aria-required="true" aria-invalid="false"> </div>
</div>
<div id="field_13_6" class="gfield gfield--type-email gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_6">
<label class="gfield_label gform-field-label" for="input_13_6">Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_6" id="input_13_6" type="email" value="" class="large" placeholder="Email" aria-required="true" aria-invalid="false">
</div>
</div>
<div id="field_13_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_above gfield--has-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_8"><label
class="gfield_label gform-field-label" for="input_13_8">Email</label>
<div class="ginput_container"><input name="input_8" id="input_13_8" type="text" value="" autocomplete="new-password"></div>
<div class="gfield_description" id="gfield_description_13_8">This field is for validation purposes and should be left unchanged.</div>
</div>
</div>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_13" class="gform_button button gform-button--width-full" value="Sign up"
onclick="if(window["gf_submitting_13"]){return false;} if( !jQuery("#gform_13")[0].checkValidity || jQuery("#gform_13")[0].checkValidity()){window["gf_submitting_13"]=true;} "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_13"]){return false;} if( !jQuery("#gform_13")[0].checkValidity || jQuery("#gform_13")[0].checkValidity()){window["gf_submitting_13"]=true;} jQuery("#gform_13").trigger("submit",[true]); }">
<input type="hidden" name="gform_ajax" value="form_id=13&title=&description=&tabindex=0&theme=gravity-theme">
<input type="hidden" class="gform_hidden" name="is_submit_13" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="13">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_13" value="WyJbXSIsImExMDkxNjI1M2Y5N2I2YzRjNDc3OGE4NzI0OTQzZjU3Il0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_13" id="gform_target_page_number_13" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_13" id="gform_source_page_number_13" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
</form>
Text Content
Skip to content * Your security challenges Close Your security challenges Open Your security challenges YOUR CYBERSECURITY CHALLENGES * We have been hit by a Cyber attack! Can NFIR help? * A PC, server or mobile device should be examined * How technically resilient is the network, our Web application, mobile application, API or Operational Engineering? * How do we maintain 24/7/365 visibility into digital threats on the IT/OT network? * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth care or debt relief application * What IT security measures can our organization still take? * We want a guarantee that the NFIR CERT is available 24/7/365 for IT Security incidents * Our employees are insufficiently knowledgeable about information security * We have been hit by a Cyber attack! Can NFIR help? * A PC, server or mobile device should be examined * How technically resilient is the network, our Web application, mobile application, API or Operational Engineering? * How do we maintain 24/7/365 visibility into digital threats on the IT/OT network? * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth care or debt relief application * What IT security measures can our organization still take? * We want a guarantee that the NFIR CERT is available 24/7/365 for IT Security incidents * Our employees are insufficiently knowledgeable about information security FIND YOUR TOPIC Search Search * Services Close Services Open Services PREVENTIVE SERVICES * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering REACTIVE SERVICES * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Media & News * About NFIR Close About NFIR Open About NFIR ABOUT NFIR * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact CONTACT * NFIR Rijswijk Laan van Zuid Hoorn 165 2289 DD Rijswijk Netherlands * NFIR Zwolle Burgemeester Roelenweg 12 8021 EV Zwolle Netherlands * +31(0)88 323 0205 SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 * * * Services Close Services Open Services PREVENTIVE SERVICES * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering REACTIVE SERVICES * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Media & News * About NFIR Close About NFIR Open About NFIR ABOUT NFIR * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact CONTACT * NFIR Rijswijk Laan van Zuid Hoorn 165 2289 DD Rijswijk Netherlands * NFIR Zwolle Burgemeester Roelenweg 12 8021 EV Zwolle Netherlands * +31(0)88 323 0205 SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 * * SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 * Your security challenges Close Your security challenges Open Your security challenges YOUR CYBERSECURITY CHALLENGES * We have been hit by a Cyber attack! Can NFIR help? * A PC, server or mobile device should be examined * How technically resilient is the network, our Web application, mobile application, API or Operational Engineering? * How do we maintain 24/7/365 visibility into digital threats on the IT/OT network? * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth care or debt relief application * What IT security measures can our organization still take? * We want a guarantee that the NFIR CERT is available 24/7/365 for IT Security incidents * Our employees are insufficiently knowledgeable about information security * We have been hit by a Cyber attack! Can NFIR help? * A PC, server or mobile device should be examined * How technically resilient is the network, our Web application, mobile application, API or Operational Engineering? * How do we maintain 24/7/365 visibility into digital threats on the IT/OT network? * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth care or debt relief application * What IT security measures can our organization still take? * We want a guarantee that the NFIR CERT is available 24/7/365 for IT Security incidents * Our employees are insufficiently knowledgeable about information security FIND YOUR TOPIC Search Search * Services Close Services Open Services PREVENTIVE SERVICES * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering REACTIVE SERVICES * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Media & News * About NFIR Close About NFIR Open About NFIR ABOUT NFIR * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact CONTACT * NFIR Rijswijk Laan van Zuid Hoorn 165 2289 DD Rijswijk Netherlands * NFIR Zwolle Burgemeester Roelenweg 12 8021 EV Zwolle Netherlands * +31(0)88 323 0205 SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 * * * Services Close Services Open Services PREVENTIVE SERVICES * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering * Pentesting * Security Monitoring * Dossier Monitoring * CIS Controls * Security Contracts * Security Awareness * Social engineering REACTIVE SERVICES * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Security Incident? Call us 24/7! * Incident Response * Incident Response Retainer * Digital Forensic Investigation * Media & News * About NFIR Close About NFIR Open About NFIR ABOUT NFIR * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact * Why, What, How from NFIR * Accreditations * Permits * Partners * Vacatures * Data Protection Officer * Contact CONTACT * NFIR Rijswijk Laan van Zuid Hoorn 165 2289 DD Rijswijk Netherlands * NFIR Zwolle Burgemeester Roelenweg 12 8021 EV Zwolle Netherlands * +31(0)88 323 0205 SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 * * SECURITY INCIDENT? CALL US 24/7 +31(0)88 133 0700 CYBER SECURITY CONTRACTS NFIR's Cyber Security Contracts provide essential preventive and reactive support for organizations to help them prepare for and quickly respond to IT security incidents. CYBER SECURITY CONTRACTS NFIR's Cyber Security Contracts provide essential preventive and reactive support for organizations to help them prepare for and quickly respond to IT security incidents. Does your organization want to properly prepare for potential Security Incidents? Then consider taking out one of our Security Contracts. Is IT Security still new to your organization and employee awareness is still at a fairly low level? Then it is Cyber Security Support Contracta good choice. We offer SMEs within this contract a number of preventive services that get you started with awareness and advice. For organizations that want a guarantee that our Computer Emergency Response Teams will act quickly and appropriately 24/7/365 in the event of an IT Security incident, we offer the Incident Response Retainer. This contract provides not only the guarantee that you can count on us, but also very important Incident and Forensics preparations. All relevant processes and technology are mapped to minimize impact and damage in the “golden hours” of an incident. Would you like more information about our Security Contracts? Then read more on the following pages or contact us to make an appointment. Incident Response Retainer INCIDENT RESPONSE RETAINER With an Incident Response Retainer Contract, your organization can count on immediate and adequate assistance from experts on the NFIR Computer Emergency Response Team. You use this service 24/7 365 days a year when your organization becomes a victim of Cyber Crime or faces other security incident requiring immediate assistance. By building a relationship with your organization’s crisis team and understanding the relevant processes and technology within your organization, quick and appropriate action can be taken. The triage and containment phase will be a lot more efficient because of proper preparation and knowledge about your IT infrastructure and processes. Read more about the Incident Response Retainer here Cyber Security Support Contract CYBER SECURITY SUPPORT CONTRACT For many companies, a cyber crime or IT security incident is lurking in wait without them being aware of it. More and more companies have cybercrime insurance, but it usually only covers consequential damage. Companies especially benefit from good preventive measures and the help of security professionals in the event of a cyber security incident. NFIR offers a Cyber Security Support Contract that meets this exact need. For a small annual fee, we offer a valuable package of preventive and reactive services. Read more about the Cyber Security Support Contract here INTERESTED IN OUR CYBER SECURITY CONTRACTS? Get in touch with us FREQUENTLY ASKED QUESTIONS NFIR IS AN OFFICIAL CERT BUT WHAT DOES THAT ACTUALLY MEAN? 1. CERT stands for Computer Emergency Response Team. The attribute is awarded by Carnagie Mellon University to companies and teams involved in digital security incidents. In the Netherlands, there are a number of official CERTs of large organisations involved in combating cyber incidents, such as the NCSC, the IBD, the Ministry of Defence, telecom organisations and banks. WHAT CAN THE INCIDENT RESPONSE TEAM DO FOR MY ORGANISATION IN CASE OF AN IT SECURITY INCIDENT? The aim of the incident response team is to minimise the impact of the cyber incident as quickly as possible so that the continuity of your organisation is no longer at stake. WHAT STEPS DOES AN INCIDENT RESPONSE PROCESS USUALLY CONSIST OF? 1. Contact NFIR's Computer Emergency Response Team (088-133 0700). 2. The CERT takes action. All necessary equipment is packed and within 3 hours the CERT is on site 3. On site, the intake is conducted with all stakeholders to gather all available information about the incident. 4. After granting the order, triage on the affected systems will be started. 5. As soon as it is clear which systems have been affected or need further investigation, data will be secured according to a digital forensic procedure. 6. In the containment phase, the affected systems are restored and security is verified to prevent a recurrence of the incident 7. In the post-incident phase, the secured data is further digitally forensically examined. As many answers as possible are given to the research questions and the subject matter of the research. All findings and recommendations will be included in a report that will be delivered at the conclusion of the incident. This report can be used for internal and external purposes (such as supervisors and for legal proceedings). WHAT ARE PREVENTIVE SERVICES WITHIN THE CYBER SECURITY SUPPORT CONTRACT? 1. When it comes to preventive services, think of: * 1-Yearly phishing email simulation to promote cyber awareness among your employees * 1-Yearly collective cyber awareness training for the Management or the Executive Board of your organisation * 1 hour of free IT Security advice per quarter * Automated weekly vulnerability scan of 2 public IP addresses WHAT ARE REACTIVE SERVICES WITHIN THE CYBER SECURITY SUPPORT CONTRACT? 1. When It comes to reactive services, think of: * Available 24/7 for IT security incidents * If possible, an Incident Response team is available at your location in The Netherlands within 3 hours (best effort) * A support contract covers the intake of 1 incident p/y free of charge STAY UP TO DATE ON THE LATEST SECURITY THREATS Stay on top of the latest IT Security threats by signing up for our Threat Intelligence reports. As soon as we publish a new Threat Intelligence report, you will be notified immediately by email. "*" indicates required fields Name* First name Insert Last name Company name* Email* Email This field is for validation purposes and should be left unchanged. NFIR - RIJSWIJK * Laan van Zuid Hoorn 165 2289 DD Rijswijk Netherlands * Directions NFIR - ZWOLLE * Burgemeester Roelenweg 12 8021 EV Zwolle Netherlands * Directions CONTACT * +31(0)88 323 0205 * info@nfir.nl * NFIR on Linkedin Copyright © 2024 NFIR B.V. * Cookie policy * General conditions of sale * Privacy statement * Complaints procedure * Responsible Disclosure * Cookie policy * General conditions of sale * Privacy statement * Complaints procedure * Responsible Disclosure Notifications