Hit by a cyber-incident? CERT is available 24/7

The Tesorion Computer Emergency Response Team (T-CERT) helps your business to keep going securely after a security incident so that you can continue operating with confidence.

Contact Us

Tesorion CERT can help in the event of a cyber incident

CERT officieel logo

Certified CERT

The Tesorion Computer Emergency Response Team offers specialist support 24/7. In emergencies, we immediately conduct an initial assessment by telephone and do all we can to get the situation under control as soon as possible. Of course, we can also send out an expert to assess the situation first-hand.

multidisciplinaire aanpak

Multidisciplinary approach

After the initial triage, we mobilise any resources that might be needed. This might, for example, involve a digital forensic investigation into the cause and scope of the incident. Our Incident Handlers then provide appropriate advice to help you regain control of the situation as soon as is humanly possible.

frontlinie tot boardroom

Front line to boardroom

The T-CERT can support and communicate at every layer within the affected organisation, from the level of system administrators to legal experts and from director to boardroom.

Why choose Tesorion?


Available 24/7

Cybercriminals never sleep and that is why the T-CERT is available whenever there is an emergency and whenever you need us.



You can count on an immediate response from our experts and once they have carried out an initial assessment, we will know what steps we need to take.

vertrouwen en transparantie


We update you continuously on what we are doing and what steps need to be taken. We understand the importance of clear communication in crisis situations.

heldere rapportage

Clear reporting

Our pragmatic approach will eventually result in a clear and easy-to-understand report detailing our findings, observed risks and recommendations.

In what kind of situations might you need help from Tesorion CERT?

Of course, not every situation is an emergency. Sometimes you will have a gut feeling that something is wrong or that your security has already been breached. T-CERT can, for example, help you carry out a forensic investigation into traces of historical or active hacking activity on servers and workstations.

T-CERT does so by using specialist software to expose indicators of malicious activity. The software in question scans various forensically relevant system sources for, among other things, (traces of) malware, system manipulations, potentially malicious system processes, and other abnormal files.

This approach can be worthwhile in the context of, for instance, businesses mergers or takeovers. A scan can, for example, be carried out prior to the actual merger to give you an early insight into a particular state of affairs and to ensure that you do not, inadvertently, carry infections over from the old network to the new one.

Finally, T-CERT can also help you with:

  • Reverse-engineering of malware;
  • Network monitoring;
  • Threat Intelligence;
  • Crisis management;
  • Media and PR support.

Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.

We offer protection to


Check out the latest relevant news, podcasts and blogs from our experts on this topic here.

26 January 2022

WakeUp Wednesday

Welcome to #WakeUpWednesday. We want to make the Netherlands digitally safe and resilient. That is why Tesorion will now give you a short overview every Wednesday in a post about…
25 January 2022

SonicWall SMA 100 series vulnerabilities

This blog contains information regarding vulnerabilities in the SonicWall SMA 100 series. As soon as we have an update, we’ll add it to this post. More information about possible risks…
21 January 2022

Oracle fixes 497 vulnerabilities

This live blog contains information regarding the Oracle critical patch update from January 2022. As soon as we have an update, we’ll add it to this post. More information about…
View all publications

Unfortunately, cyber-threats are no longer something new. However, a truly coherent cyber-approach is.

[spotler_form_div mpformid="1364" feid="32nJmWf99AfieJLcV9Rz" collapsable="no" id_privacydisplay_part1="CNT1762" id_privacydisplay_part2="CNT1772"]