{"id":47607,"date":"2022-09-26T15:19:46","date_gmt":"2022-09-26T13:19:46","guid":{"rendered":"https:\/\/cyberant.com\/hoe-werkt-de-cyberrisk\/"},"modified":"2023-04-12T15:45:14","modified_gmt":"2023-04-12T13:45:14","slug":"how-does-the-cyberrisk-work","status":"publish","type":"post","link":"https:\/\/cyberant.com\/en\/how-does-the-cyberrisk-work\/","title":{"rendered":"How does the CyberRisk work?"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8ismwaj-8f94328e6912ce448e58b44623635f2c\">\n#top .av_textblock_section.av-l8ismwaj-8f94328e6912ce448e58b44623635f2c .avia_textblock{\nfont-size:40px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8ismwaj-8f94328e6912ce448e58b44623635f2c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 class=\"h2 entry-title\">How does the CyberRisk work?<\/h1>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-8ddc7023771561a08c2d1878cbb01bdc\">\n#top .hr.hr-invisible.av-av_hr-8ddc7023771561a08c2d1878cbb01bdc{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-8ddc7023771561a08c2d1878cbb01bdc hr-invisible  avia-builder-el-1  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8isoean-00a99f5ba4c8d2645ecf6984edd716bf\">\n#top .av_textblock_section.av-l8isoean-00a99f5ba4c8d2645ecf6984edd716bf .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8isoean-00a99f5ba4c8d2645ecf6984edd716bf '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span lang=\"en\">The CyberRisk is displayed within the\u00a0<a href=\"https:\/\/cyberant.com\/en\/website-security-check\/\">Website security check<\/a>\u00a0and NetCaptain with all systems and is intended to indicate how (un) secure a system is. It is good to realize that we cannot speak of a safe system when the CyberRisk is below a certain value. In general, however, we can say that when the CyberRisk has increased, the chance of abuse increases. The CyberRisk will help you determine if you are on the right track in terms of security. The higher the CyberRisk, the higher the risk.<\/span><\/p>\n<h3><span lang=\"en\">How is the CyberRisk calculated?<\/span><\/h3>\n<p><span lang=\"en\">The minimum score is a CyberRisk of 100. This indicates that there is always a risk, even if all findings have been resolved. It may be that there are vulnerabilities in the system that have not yet been discovered. The CyberRisk score is determined as follows: it looks at the open vulnerabilities; we count low findings once, medium findings three times, high findings twelve times and critical findings fifteen. Obviously, we do not count resolved findings. Within NetCaptain and Colony it is possible to indicate whether a system is internet facing (for example a website). In that case, the score will be increased by 20%. Servers that hackers can access directly run a greater risk of being attacked. With the Website security check and WebShepherd, this bonus is included as standard because websites are by definition internet facing.<\/span><\/p>\n<picture><source srcset=\"https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png.webp 300w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk-361x300.png.webp 361w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk.png.webp 694w\" type=\"image\/webp\" sizes=\"(max-width: 300px) 100vw, 300px\" data-lazy-srcset=\"https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png.webp 300w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk-361x300.png.webp 361w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/cyberrisk.png.webp 694w\" \/><img decoding=\"async\" class=\"alignnone size-medium wp-image-1379 webpexpress-processed entered lazyloaded\" src=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png\" sizes=\"(max-width: 300px) 100vw, 300px\" srcset=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png 300w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-361x300.png 361w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk.png 694w\" alt=\"CyberRisk voorbeeld grafiek\" width=\"300\" height=\"249\" data-lazy-srcset=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png 300w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-361x300.png 361w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk.png 694w\" data-lazy-sizes=\"(max-width: 300px) 100vw, 300px\" data-lazy-src=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/cyberrisk-300x249.png\" data-ll-status=\"loaded\" \/><\/picture>\n<p><span lang=\"en\">The graph above shows how the CyberRisk relates to the number of vulnerabilities. The red line is CyberRisk, the blue is the number of vulnerabilities. After the first scan, 100 vulnerabilities are resolved. It is striking that this makes little difference to the CyberRisk: after the second scan there is practically no decrease to be seen. This is because the focus was on brushing away trivial findings as quickly as possible. If we then look at the last scan, we see that another 100 findings have been resolved, but that this time we looked at what is important. As a result, we see that the CyberRisk has been cut in half. The above example shows well how the CyberRisk can help to check whether the focus is right, are we solving risk based, or are we going for quantity?<\/span><\/p>\n<div class=\"text-center\">\n<div class=\"post-thumbnail\"><picture><source srcset=\"https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/chart-down-4-1024x686.png.webp 1024w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/chart-down-4-300x201.png.webp 300w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/chart-down-4-768x514.png.webp 768w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/chart-down-4-413x276.png.webp 413w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2021\/02\/chart-down-4.png.webp 1198w\" type=\"image\/webp\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><img decoding=\"async\" class=\"attachment-large size-large wp-post-image webpexpress-processed\" src=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4-1024x686.png\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4-1024x686.png 1024w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4-300x201.png 300w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4-768x514.png 768w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4-413x276.png 413w, https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4.png 1198w\" alt=\"chart down\" width=\"640\" height=\"429\" \/><\/picture><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":1417,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[216,180,181],"tags":[182,183,184,190,191,185,192,193,194,188],"class_list":["post-47607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base","category-product-information","category-risk-management","tag-cyber-security-en","tag-cyberaanval-en","tag-cyberrisk-en","tag-datalekken-en","tag-etisch-hacker-en","tag-hacker-en","tag-owasp-en","tag-penetration-test-en","tag-pentest-en","tag-vulnerability-management-en"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47607"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47607\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media\/1417"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/categories?post=47607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/tags?post=47607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}