www.nfir.nl Open in urlscan Pro
2a01:7c8:f0:10c1::ffaa:627a  Public Scan

Submitted URL: https://search.app/zbfUEpnsNpRYfnMf9
Effective URL: https://www.nfir.nl/en/cyber-security-contracts/
Submission: On August 26 via manual from CO — Scanned from US

Form analysis 3 forms found in the DOM

GET https://www.nfir.nl/en/

<form class="elementor-search-form" action="https://www.nfir.nl/en/" method="get" data-hs-cf-bound="true">
  <div class="elementor-search-form__container">
    <label class="elementor-screen-only" for="elementor-search-form-2b665dcb">Search</label>
    <input id="elementor-search-form-2b665dcb" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
    <input type="hidden" name="lang" value="en">
    <button class="elementor-search-form__submit" type="submit" aria-label="Search">
      <div class="e-font-icon-svg-container"><svg class="fa fa-search e-font-icon-svg e-fas-search" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg">
          <path
            d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
          </path>
        </svg></div> <span class="elementor-screen-only">Search</span>
    </button>
  </div>
</form>

GET https://www.nfir.nl/en/

<form class="elementor-search-form" action="https://www.nfir.nl/en/" method="get" data-hs-cf-bound="true">
  <div class="elementor-search-form__container">
    <label class="elementor-screen-only" for="elementor-search-form-2b665dcb">Search</label>
    <input id="elementor-search-form-2b665dcb" placeholder="Search..." class="elementor-search-form__input" type="search" name="s" value="">
    <input type="hidden" name="lang" value="en">
    <button class="elementor-search-form__submit" type="submit" aria-label="Search">
      <div class="e-font-icon-svg-container"><svg class="fa fa-search e-font-icon-svg e-fas-search" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg">
          <path
            d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
          </path>
        </svg></div> <span class="elementor-screen-only">Search</span>
    </button>
  </div>
</form>

POST /en/cyber-security-contracts/#gf_13

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_13" id="gform_13" class="vereist-veld recaptcha-v3-initialized" action="/en/cyber-security-contracts/#gf_13" data-formid="13" novalidate="" data-hs-cf-bound="true">
  <div class="gf_invisible ginput_recaptchav3" data-sitekey="6LfmaGsbAAAAAGsZNz38-fzIwXHnLNIyJu3EFl9r" data-tabindex="0"><input id="input_f0f979ac39cfb1adbcbbd07077fac107" class="gfield_recaptcha_response" type="hidden"
      name="input_f0f979ac39cfb1adbcbbd07077fac107" value=""></div>
  <div class="gform-body gform_body">
    <div id="gform_fields_13" class="gform_fields top_label form_sublabel_above description_below validation_below">
      <fieldset id="field_13_7" class="gfield gfield--type-name gfield--width-full naam-formulier gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_below field_validation_below gfield_visibility_visible"
        data-js-reload="field_13_7">
        <legend class="gfield_label gform-field-label gfield_label_before_complex">Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></legend>
        <div class="ginput_complex ginput_container ginput_container--name no_prefix has_first_name has_middle_name has_last_name no_suffix gf_name_has_3 ginput_container_name gform-grid-row" id="input_13_7">
          <span id="input_13_7_3_container" class="name_first gform-grid-col gform-grid-col--size-auto">
            <input type="text" name="input_7.3" id="input_13_7_3" value="" aria-required="true" placeholder="First name">
            <label for="input_13_7_3" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">First name</label>
          </span>
          <span id="input_13_7_4_container" class="name_middle gform-grid-col gform-grid-col--size-auto">
            <input type="text" name="input_7.4" id="input_13_7_4" value="" aria-required="false" placeholder="Insert">
            <label for="input_13_7_4" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">Insert</label>
          </span>
          <span id="input_13_7_6_container" class="name_last gform-grid-col gform-grid-col--size-auto">
            <input type="text" name="input_7.6" id="input_13_7_6" value="" aria-required="true" placeholder="Last name">
            <label for="input_13_7_6" class="gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text">Last name</label>
          </span>
        </div>
      </fieldset>
      <div id="field_13_5" class="gfield gfield--type-text gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_5">
        <label class="gfield_label gform-field-label" for="input_13_5">Company name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_text"><input name="input_5" id="input_13_5" type="text" value="" class="large" placeholder="Company name" aria-required="true" aria-invalid="false"> </div>
      </div>
      <div id="field_13_6" class="gfield gfield--type-email gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_6">
        <label class="gfield_label gform-field-label" for="input_13_6">Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_6" id="input_13_6" type="email" value="" class="large" placeholder="Email" aria-required="true" aria-invalid="false">
        </div>
      </div>
      <div id="field_13_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_above gfield--has-description field_description_below field_validation_below gfield_visibility_visible" data-js-reload="field_13_8"><label
          class="gfield_label gform-field-label" for="input_13_8">Email</label>
        <div class="ginput_container"><input name="input_8" id="input_13_8" type="text" value="" autocomplete="new-password"></div>
        <div class="gfield_description" id="gfield_description_13_8">This field is for validation purposes and should be left unchanged.</div>
      </div>
    </div>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_13" class="gform_button button gform-button--width-full" value="Sign up"
      onclick="if(window[&quot;gf_submitting_13&quot;]){return false;}  if( !jQuery(&quot;#gform_13&quot;)[0].checkValidity || jQuery(&quot;#gform_13&quot;)[0].checkValidity()){window[&quot;gf_submitting_13&quot;]=true;}  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_13&quot;]){return false;} if( !jQuery(&quot;#gform_13&quot;)[0].checkValidity || jQuery(&quot;#gform_13&quot;)[0].checkValidity()){window[&quot;gf_submitting_13&quot;]=true;}  jQuery(&quot;#gform_13&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" name="gform_ajax" value="form_id=13&amp;title=&amp;description=&amp;tabindex=0&amp;theme=gravity-theme">
    <input type="hidden" class="gform_hidden" name="is_submit_13" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="13">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_13" value="WyJbXSIsImExMDkxNjI1M2Y5N2I2YzRjNDc3OGE4NzI0OTQzZjU3Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_13" id="gform_target_page_number_13" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_13" id="gform_source_page_number_13" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

Skip to content
 * Your security challenges
   Close Your security challenges Open Your security challenges
   
   
   YOUR CYBERSECURITY CHALLENGES
   
    * We have been hit by a Cyber attack! Can NFIR help?
    * A PC, server or mobile device should be examined
    * How technically resilient is the network, our Web application, mobile
      application, API or Operational Engineering?
    * How do we maintain 24/7/365 visibility into digital threats on the IT/OT
      network?
    * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth
      care or debt relief application
    * What IT security measures can our organization still take?
    * We want a guarantee that the NFIR CERT is available 24/7/365 for IT
      Security incidents
    * Our employees are insufficiently knowledgeable about information security
   
    * We have been hit by a Cyber attack! Can NFIR help?
    * A PC, server or mobile device should be examined
    * How technically resilient is the network, our Web application, mobile
      application, API or Operational Engineering?
    * How do we maintain 24/7/365 visibility into digital threats on the IT/OT
      network?
    * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth
      care or debt relief application
    * What IT security measures can our organization still take?
    * We want a guarantee that the NFIR CERT is available 24/7/365 for IT
      Security incidents
    * Our employees are insufficiently knowledgeable about information security
   
   
   FIND YOUR TOPIC
   
   Search
   
   Search
 * Services
   Close Services Open Services
   
   
   PREVENTIVE SERVICES
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
   
   REACTIVE SERVICES
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation

 * Media & News
 * About NFIR
   Close About NFIR Open About NFIR
   
   
   ABOUT NFIR
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
   
   CONTACT
   
    * NFIR Rijswijk
      Laan van Zuid Hoorn 165
      2289 DD Rijswijk
      Netherlands
    * NFIR Zwolle
      Burgemeester Roelenweg 12
      8021 EV Zwolle
      Netherlands
    * +31(0)88 323 0205
   
   SECURITY INCIDENT?
   CALL US 24/7 +31(0)88 133 0700

 * 
 * 

 * Services
   Close Services Open Services
   
   
   PREVENTIVE SERVICES
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
   
   REACTIVE SERVICES
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation

 * Media & News
 * About NFIR
   Close About NFIR Open About NFIR
   
   
   ABOUT NFIR
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
   
   CONTACT
   
    * NFIR Rijswijk
      Laan van Zuid Hoorn 165
      2289 DD Rijswijk
      Netherlands
    * NFIR Zwolle
      Burgemeester Roelenweg 12
      8021 EV Zwolle
      Netherlands
    * +31(0)88 323 0205
   
   SECURITY INCIDENT?
   CALL US 24/7 +31(0)88 133 0700
 *  * 

SECURITY INCIDENT?
CALL US 24/7 +31(0)88 133 0700

 * Your security challenges
   Close Your security challenges Open Your security challenges
   
   
   YOUR CYBERSECURITY CHALLENGES
   
    * We have been hit by a Cyber attack! Can NFIR help?
    * A PC, server or mobile device should be examined
    * How technically resilient is the network, our Web application, mobile
      application, API or Operational Engineering?
    * How do we maintain 24/7/365 visibility into digital threats on the IT/OT
      network?
    * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth
      care or debt relief application
    * What IT security measures can our organization still take?
    * We want a guarantee that the NFIR CERT is available 24/7/365 for IT
      Security incidents
    * Our employees are insufficiently knowledgeable about information security
   
    * We have been hit by a Cyber attack! Can NFIR help?
    * A PC, server or mobile device should be examined
    * How technically resilient is the network, our Web application, mobile
      application, API or Operational Engineering?
    * How do we maintain 24/7/365 visibility into digital threats on the IT/OT
      network?
    * Privacy-sensitive records may be unlawfully accessed in an EHR, ECD, youth
      care or debt relief application
    * What IT security measures can our organization still take?
    * We want a guarantee that the NFIR CERT is available 24/7/365 for IT
      Security incidents
    * Our employees are insufficiently knowledgeable about information security
   
   
   FIND YOUR TOPIC
   
   Search
   
   Search
 * Services
   Close Services Open Services
   
   
   PREVENTIVE SERVICES
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
   
   REACTIVE SERVICES
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation

 * Media & News
 * About NFIR
   Close About NFIR Open About NFIR
   
   
   ABOUT NFIR
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
   
   CONTACT
   
    * NFIR Rijswijk
      Laan van Zuid Hoorn 165
      2289 DD Rijswijk
      Netherlands
    * NFIR Zwolle
      Burgemeester Roelenweg 12
      8021 EV Zwolle
      Netherlands
    * +31(0)88 323 0205
   
   SECURITY INCIDENT?
   CALL US 24/7 +31(0)88 133 0700

 * 
 * 

 * Services
   Close Services Open Services
   
   
   PREVENTIVE SERVICES
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
    * Pentesting
    * Security Monitoring
    * Dossier Monitoring
    * CIS Controls
    * Security Contracts
    * Security Awareness
    * Social engineering
   
   
   REACTIVE SERVICES
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation
   
    * Security Incident? Call us 24/7!
    * Incident Response
    * Incident Response Retainer
    * Digital Forensic Investigation

 * Media & News
 * About NFIR
   Close About NFIR Open About NFIR
   
   
   ABOUT NFIR
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
    * Why, What, How from NFIR
    * Accreditations
    * Permits
    * Partners
    * Vacatures
    * Data Protection Officer
    * Contact
   
   
   CONTACT
   
    * NFIR Rijswijk
      Laan van Zuid Hoorn 165
      2289 DD Rijswijk
      Netherlands
    * NFIR Zwolle
      Burgemeester Roelenweg 12
      8021 EV Zwolle
      Netherlands
    * +31(0)88 323 0205
   
   SECURITY INCIDENT?
   CALL US 24/7 +31(0)88 133 0700
 *  * 

SECURITY INCIDENT?
CALL US 24/7 +31(0)88 133 0700



CYBER SECURITY CONTRACTS

NFIR's Cyber Security Contracts provide essential preventive and reactive
support for organizations to help them prepare for and quickly respond to IT
security incidents.




CYBER SECURITY CONTRACTS

NFIR's Cyber Security Contracts provide essential preventive and reactive
support for organizations to help them prepare for and quickly respond to IT
security incidents.


Does your organization want to properly prepare for potential Security
Incidents? Then consider taking out one of our Security Contracts. Is IT
Security still new to your organization and employee awareness is still at a
fairly low level? Then it is Cyber Security Support Contracta good choice. We
offer SMEs within this contract a number of preventive services that get you
started with awareness and advice. For organizations that want a guarantee that
our Computer Emergency Response Teams will act quickly and appropriately
24/7/365 in the event of an IT Security incident, we offer the Incident Response
Retainer. This contract provides not only the guarantee that you can count on
us, but also very important Incident and Forensics preparations. All relevant
processes and technology are mapped to minimize impact and damage in the “golden
hours” of an incident.

Would you like more information about our Security Contracts? Then read more on
the following pages or contact us to make an appointment.



Incident Response Retainer


INCIDENT RESPONSE RETAINER

With an Incident Response Retainer Contract, your organization can count on
immediate and adequate assistance from experts on the NFIR Computer Emergency
Response Team. You use this service 24/7 365 days a year when your organization
becomes a victim of Cyber Crime or faces other security incident requiring
immediate assistance. By building a relationship with your organization’s crisis
team and understanding the relevant processes and technology within your
organization, quick and appropriate action can be taken. The triage and
containment phase will be a lot more efficient because of proper preparation and
knowledge about your IT infrastructure and processes.



Read more about the Incident Response Retainer here
Cyber Security Support Contract


CYBER SECURITY SUPPORT CONTRACT

For many companies, a cyber crime or IT security incident is lurking in wait
without them being aware of it. More and more companies have cybercrime
insurance, but it usually only covers consequential damage. Companies especially
benefit from good preventive measures and the help of security professionals in
the event of a cyber security incident. NFIR offers a Cyber Security Support
Contract that meets this exact need. For a small annual fee, we offer a valuable
package of preventive and reactive services.



Read more about the Cyber Security Support Contract here


INTERESTED IN OUR CYBER SECURITY CONTRACTS?

Get in touch with us


FREQUENTLY ASKED QUESTIONS

NFIR IS AN OFFICIAL CERT BUT WHAT DOES THAT ACTUALLY MEAN?

 1. CERT stands for Computer Emergency Response Team. The attribute is awarded
    by Carnagie Mellon University to companies and teams involved in digital
    security incidents. In the Netherlands, there are a number of official CERTs
    of large organisations involved in combating cyber incidents, such as the
    NCSC, the IBD, the Ministry of Defence, telecom organisations and banks.

WHAT CAN THE INCIDENT RESPONSE TEAM DO FOR MY ORGANISATION IN CASE OF AN IT
SECURITY INCIDENT?

The aim of the incident response team is to minimise the impact of the cyber
incident as quickly as possible so that the continuity of your organisation is
no longer at stake.

WHAT STEPS DOES AN INCIDENT RESPONSE PROCESS USUALLY CONSIST OF?

 1. Contact NFIR's Computer Emergency Response Team (088-133 0700).
 2. The CERT takes action. All necessary equipment is packed and within 3 hours
    the CERT is on site
 3. On site, the intake is conducted with all stakeholders to gather all
    available information about the incident.
 4. After granting the order, triage on the affected systems will be started.
 5. As soon as it is clear which systems have been affected or need further
    investigation, data will be secured according to a digital forensic
    procedure.
 6. In the containment phase, the affected systems are restored and security is
    verified to prevent a recurrence of the incident
 7. In the post-incident phase, the secured data is further digitally
    forensically examined. As many answers as possible are given to the research
    questions and the subject matter of the research. All findings and
    recommendations will be included in a report that will be delivered at the
    conclusion of the incident. This report can be used for internal and
    external purposes (such as supervisors and for legal proceedings).

WHAT ARE PREVENTIVE SERVICES WITHIN THE CYBER SECURITY SUPPORT CONTRACT?

 1. When it comes to preventive services, think of:
    
    * 1-Yearly phishing email simulation to promote cyber awareness among your
      employees
    * 1-Yearly collective cyber awareness training for the Management or the
      Executive Board of your organisation
    * 1 hour of free IT Security advice per quarter
    * Automated weekly vulnerability scan of 2 public IP addresses

WHAT ARE REACTIVE SERVICES WITHIN THE CYBER SECURITY SUPPORT CONTRACT?

 1. When It comes to reactive services, think of:
    
    * Available 24/7 for IT security incidents
    * If possible, an Incident Response team is available at your location in
      The Netherlands within 3 hours (best effort)
    * A support contract covers the intake of 1 incident p/y free of charge

STAY UP TO DATE ON THE LATEST SECURITY THREATS

Stay on top of the latest IT Security threats by signing up for our Threat
Intelligence reports. As soon as we publish a new Threat Intelligence report,
you will be notified immediately by email.

"*" indicates required fields

Name*
First name Insert Last name
Company name*

Email*

Email

This field is for validation purposes and should be left unchanged.


NFIR - RIJSWIJK

 * Laan van Zuid Hoorn 165
   2289 DD Rijswijk
   Netherlands
 * Directions

NFIR - ZWOLLE

 * Burgemeester Roelenweg 12
   8021 EV Zwolle
   Netherlands
 * Directions

CONTACT

 * +31(0)88 323 0205
 * info@nfir.nl
 * NFIR on Linkedin




Copyright © 2024 NFIR B.V.

 * Cookie policy
 * General conditions of sale
 * Privacy statement
 * Complaints procedure
 * Responsible Disclosure

 * Cookie policy
 * General conditions of sale
 * Privacy statement
 * Complaints procedure
 * Responsible Disclosure

Notifications