5. Our advice
5.1 Watch out for your entry points
To limit access to sensitive data (as opposed to "personal" data, which is less sensitive), it's best to restrict it to a few authorized accounts. This limits the areas at risk.
Use complex passwords with multi-factor authentication. Use HIPS, NPIS and SIDS software to monitor network flows, workstations, drivers and servers.
Use software that prohibits the use of USB keys, the main vectors of intrusive attacks.
A data backup plan, tested regularly, is required via external service providers. Clean rooms located outside the offices enable rapid recovery in the event of fire or external attack.
Awareness of current regulations and training in basic IT...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Management and innovation engineering
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Our advice
Bibliography
SERRES Michel - Petite Poucette. Le Pommier (2012).
Websites
An ordinance concerns all electronic exchanges, teleservices or e-mails exchanged with administrations, whether they be State administrations, local authorities, their public administrative establishments, social security organizations or other private-sector bodies managing public administrative services.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference