Publish: 3 May 2018

Hub One delivers its 10 cybersecurity tips

<![CDATA[

Hub One, provider of information and communication technology services in professional environments, presents its 10 tips for improving cybersecurity inside companies. Through its initial recommendations, Hub One advises and supports businesses in defining and deploying information system protection measures.

 

  1. Not restricting cybersecurity purely to technical measures
    Cybersecurity is still today frequently associated with exclusively technical measures (filtering, web, antivirus, etc.). An efficient cybersecurity strategy must also be based on organisational and human measures.
  2. Defining objectives
    A security approach needs to be founded on a clear strategy, with the long-term involvement of top management, and taking account of the stakes, the data, the processes and the regulations.
  3. Establishing a diagnostic
    To embark on a security approach, you need to begin with a legacy audit to identify the risks and prepare for them.
  4. Investing in your employees
    The first line of defence remains your employees. It is vital to sensitise them to cyber risk and train them in passing on information.
  5. Facilitating the adoption of strong passwords
    This is a priority for ensuring the security of the information system, and there are simple tools for facilitating password management.
  6. Managing flows
    Protecting the information system includes controlling the physical and data flows: managing and controlling each movement needs to become a golden rule.
  7. Managing connections to the information system
    Defining and communicating the rules of best practice for accessing the information system is the step making it possible to control the numerous entry gateways: USB port, Wi-Fi network connection, etc.
  8. Partitioning off networks to contain threats
    Segmenting the networks will enable attacks to be confined and the damage to be limited, by avoiding any propagation.
  9. Supervising security
    The cyber security policy must be founded on the principle of vigilance: detecting abnormal behaviours, surveilling administration accounts, monitoring network connections, etc.
  1. Regularly overhauling cybersecurity
    In issues of cyber security, things are changing permanently and very quickly, and so you need to regularly test and adapt security accordingly.

 
 
 ]]>

To receive Hub One documentation targeted to your needs

This site stores cookies and other trackers on your equipment. These cookies are used by Hub One to collect information on how you interact with the Site and to establish statistics and volumes of visits and use in order to improve the User's journey. You can choose not to allow certain types of cookies. Click on the different cookie category headings below to learn more and change your cookie settings.

You can revoke your authorization to use cookies at any time (Cookie preferences). A cookie will always be used to remember your choices. Refusing the use of certain cookies may have an impact on your use of the Site.
Find out more: Cookies policy
Cookie preferences
Refuse all cookies
Accept all cookies