Our advice
Cyber risk
Practical sheet REF: FIC1855 V1
Our advice
Cyber risk

Authors : Pierre MONGIN, Laurent DELHALLE

Publication date: January 10, 2025 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. Our advice

5.1 Watch out for your entry points

To limit access to sensitive data (as opposed to "personal" data, which is less sensitive), it's best to restrict it to a few authorized accounts. This limits the areas at risk.

Use complex passwords with multi-factor authentication. Use HIPS, NPIS and SIDS software to monitor network flows, workstations, drivers and servers.

Use software that prohibits the use of USB keys, the main vectors of intrusive attacks.

A data backup plan, tested regularly, is required via external service providers. Clean rooms located outside the offices enable rapid recovery in the event of fire or external attack.

Awareness of current regulations and training in basic IT...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Management and innovation engineering"

( 434 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us