5. Our advice
5.1 Watch out for your entry points
To limit access to sensitive data (as opposed to "personal" data, which is less sensitive), it's best to restrict it to a few authorized accounts. This limits the areas at risk.
Use complex passwords with multi-factor authentication. Use HIPS, NPIS and SIDS software to monitor network flows, workstations, drivers and servers.
Use software that prohibits the use of USB keys, the main vectors of intrusive attacks.
A data backup plan, tested regularly, is required via external service providers. Clean rooms located outside the offices enable rapid recovery in the event of fire or external attack.
Awareness of current regulations and training in basic IT...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Our advice
Article included in this offer
"Management and innovation engineering"
(
434 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
SERRES Michel - Petite Poucette. Le Pommier (2012).
Websites
An ordinance concerns all electronic exchanges, teleservices or e-mails exchanged with administrations, whether they be State administrations, local authorities, their public administrative establishments,...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!