Introduction
At MITE3 Cybersecurity, we take security seriously. As a cybersecurity company, we believe we must lead by example and treat our own security with the same level of care as that of our clients.
Security measures
- Systems and services are designed and configured according to the principles of security-by-design and defense-in-depth.
- Access to systems and data requires identification and authentication.
- Access is granted based on the principle of least privilege.
- Accounts use strong authentication mechanisms, including strong passwords and, where possible, two-factor authentication.
- Data transmission and storage are protected with encryption where appropriate, following current and widely accepted standards.
- Data storage is supported by version control and/or encrypted backup replication.*
- Backups and archives are managed according to applicable retention periods and internal retention policies.*
- System configurations are set up according to secure configuration principles before being put into use.
- Protection against malware, exploits, and ransomware is active where technically possible.*
- Publicly accessible systems are protected with appropriate network and application security, including measures against abuse and disruption of services.*
- Our email communication is protected with appropriate technical measures to prevent abuse and spoofing.*
- Our websites, applications, and APIs use modern security measures to limit unauthorized access and abuse.*
- Systems and services are monitored where appropriate to detect security incidents and anomalous behavior in a timely manner.
- Security updates are applied in a timely manner based on risk assessment and availability.
- We only use software, hardware, and services that are actively supported and not designated as ‘End-of-Life’.
- Where we use external suppliers or cloud platforms, we take appropriate measures to safeguard the security of data and systems.
- Security measures are periodically evaluated and adjusted where necessary in response to new threats, technological developments, and operational insights.
- Personal data is processed in line with the GDPR and other applicable laws and regulations.
- We aim for transparency regarding security incidents, data breaches, legal requests, and vulnerability reports, within the limits of applicable laws and regulations.
*) These measures depend on technical availability and may not be applicable in all situations.
Domains We Use
We use a limited number of official domains.
Only the domains listed below are managed by us. Websites, apps, APIs, or emails that use other domain names do not originate from MITE3.
Our official domains are:
mite3.nlmite3.commite3.link(URL shortening service)datalekt.nl
We also use subdomains on our official domains.
We additionally own a number of redirect domains that are used solely for forwarding to our primary domains. These domains:
- host no content
- send no email
- never ask for login credentials
- never display forms
A complete overview of these redirect domains is available upon request.
Email Authenticity
All email communication from MITE3 originates exclusively from the domains listed below:
mite3.nlmite3.com
We use subdomains within these domains (for example for applications or automated messages), but we do not use any other domains for sending or receiving email.
Did you receive an email that appears to be from MITE3, but does not end with one of the domains above?
Treat it as suspicious and, if in doubt, contact us via [email protected].
Domains that are NOT ours
Sometimes domains are registered that resemble our brand name. These domains are not managed by MITE3 and may be used for deception, phishing, or other forms of abuse.
Examples of domains we have encountered but that are not managed by us:
mite3-insight.com
Have you come across a domain that resembles MITE3 but is not listed above?
Please contact us directly via [email protected].
We actively investigate these reports and take action when necessary.
Suspected phishing or abuse
Do you doubt the authenticity of a website, message, or email claiming to be from MITE3?
If so, please send it to [email protected]. We greatly appreciate these reports.