The 5 basic principles of secure digital entrepreneurship As an entrepreneur, you don't want your business to be disturbed by cyberrisks. [We see a shopping street.] Protect yourself from cyberthreats. [We see several persons in an office building. Everyone is working, on different devices.] It's not hard. It starts with these 5 basic principles. [We see the main character with a clipboard in his hand.] [1] Take stock today: determine which business processes and information are critical and sensitive. [We zoom in on the clipboard and an illegible list with the heading "inventory list". Green check marks appear on the list.] It will help prevent data leaks or disruption of your business processes. [We see a sign on the front door changing form "We're open" to "Sorry, we're closed". ] [2] Choose the safest settings for your devices, software, and internet connections. [We see a computer screen: we choose "change now"and type in a strong password (according to the program).] Make sure cybercriminals cannot enter your systems. [Nu we see a cybercriminal in front of that same computer screen, typing in 0000 to no avail.] [3] Keep devices and software up to date. [We see a computer screen: we choose "install now".] Ward off unpleasant surprises. [We see our person give a presentation in fron of a big screen (connected to the laptop). On the screen we see: "access denied".] [4] Only give people access to the systems and data they need. [We see an employee sitting in an office and working on his computer. He clicks a link to a folder 'management' and the notification "access denied" appears.] And prevent unpleasant situations. [We see the employee with a binder containing paperwork, and the label "Company secrets". He enters an office building labelled 'the competition".] [5] Protect yourself from viruses and other malware. [We see a person in front of a screen with a presentation, colleagues in a meeting, and on the screen a usb stick that is crossed out.] Make sure viruses don't get a chance to spread across your company network like wildfire. [We see one person insert a usb device into the usb port of the laptop. Now a red cross appears, first next to this first person, and quickly afterwards next to all the other colleagues. Like a domino effect.] You can build an armor against cyberthreats, [Now we see the film rewinding (with sound and visual effects of a rewinding videotape)] if you always apply the 5 basic principles in your company. [Hacker fails to login to the computer, an entrepreneur closes a deal with a customer, the sign "we're open" appears.] Want to know more about secure digital business operations? Go to Digital Trust Center.nl ["Find out more? www.digitaltrustcenter.nl"]