Other information and services: www.belgium.be

Misconfiguration of software and hardware

Misconfiguration of software and hardware configuration means that an IT system or one of its components is not set up correctly. This can lead to errors or vulnerabilities in the system, jeopardising its security and smooth functioning.  

 

Sub-optimal configuration is the main cause of computer outages. 

What can you do?

BEFORE

As an organisation or company, there are various steps you can take:  

Are you a private Internet user? Visit safeonweb.be for solutions to common cyber incidents. 

DURING

AFTER

  • Are you a victim of cybercriminals? Report it to the police.

Impact and probability

The figures relating to probability and impact may reflect sub-optimal configuration of software and/or hardware on a considerable scale. The BNRA theoretically describes such a scenario as follows: 

  • An incident relating to sub-optimal configuration affects critical services, such as water supply, food distribution, medical services, telecommunications or other physical or security needs.  
  • The problem is identified and resolved within a week using internal resources, possibly supplemented by external front-line support.  
  • The disruption affects fewer than 10,000 people and lasts about a day. 

How should you interpret these results?

Within the BNRA, experts assessed three scenarios for each risk: considerable, major or extreme. On each page, you will find the results of the scenario with the highest score based on the combination of likelihood and impact. This does not mean that this scenario will occur or is the most likely. Read more here about how to correctly interpret the results

Probability

Strong

Human impact

Very weak

Societal impact

Weak

Environmental impact

No impact

Financial impact

Weak

What do the authorities do?

The Centre for Cybersecurity Belgium (CCB) is the national authority responsible for cybersecurity in Belgium. It supervises, coordinates and monitors the application of the Belgian cybersecurity strategy. Through optimal information exchange, companies, the government, providers of essential services and the population can protect themselves appropriately.