Publish: 3 mai 2018

Hub One delivers its 10 cybersecurity tips

<![CDATA[

Hub One, provider of information and communication technology services in professional environments, presents its 10 tips for improving cybersecurity inside companies. Through its initial recommendations, Hub One advises and supports businesses in defining and deploying information system protection measures.

 

  1. Not restricting cybersecurity purely to technical measures
    Cybersecurity is still today frequently associated with exclusively technical measures (filtering, web, antivirus, etc.). An efficient cybersecurity strategy must also be based on organisational and human measures.
  2. Defining objectives
    A security approach needs to be founded on a clear strategy, with the long-term involvement of top management, and taking account of the stakes, the data, the processes and the regulations.
  3. Establishing a diagnostic
    To embark on a security approach, you need to begin with a legacy audit to identify the risks and prepare for them.
  4. Investing in your employees
    The first line of defence remains your employees. It is vital to sensitise them to cyber risk and train them in passing on information.
  5. Facilitating the adoption of strong passwords
    This is a priority for ensuring the security of the information system, and there are simple tools for facilitating password management.
  6. Managing flows
    Protecting the information system includes controlling the physical and data flows: managing and controlling each movement needs to become a golden rule.
  7. Managing connections to the information system
    Defining and communicating the rules of best practice for accessing the information system is the step making it possible to control the numerous entry gateways: USB port, Wi-Fi network connection, etc.
  8. Partitioning off networks to contain threats
    Segmenting the networks will enable attacks to be confined and the damage to be limited, by avoiding any propagation.
  9. Supervising security
    The cyber security policy must be founded on the principle of vigilance: detecting abnormal behaviours, surveilling administration accounts, monitoring network connections, etc.
  1. Regularly overhauling cybersecurity
    In issues of cyber security, things are changing permanently and very quickly, and so you need to regularly test and adapt security accordingly.

 
 
 ]]>

Pour recevoir la documentation Hub One adaptée à vos besoins

Le présent site stocke des cookies et autres traceurs sur votre équipement (ci-après dénommés « cookies »). Ces cookies sont utilisés par Hub One pour collecter des informations sur la manière dont vous interagissez avec le site et établir des statistiques et des volumes de fréquentation et d’utilisation afin d’améliorer votre parcours en tant qu’utilisateur.
Vous pouvez choisir de ne pas autoriser certains types de cookies, à l’exception de ceux permettant la fourniture du présent site web et qui sont strictement nécessaires au fonctionnement de ce dernier. Pour accepter ou refuser l’utilisation des différentes catégories de cookies (à l’exception de la catégorie des cookies strictement nécessaires), rendez-vous dans les Préférences cookies.
Vous pouvez à tout moment revenir sur votre autorisation d’utilisation des cookies (Préférences cookies).
Le refus de l’utilisation de certains cookies peut avoir un impact sur votre utilisation du site.
En savoir plus : Politique cookies
Préférences cookies
Refuser tous les cookies
Accepter tous les cookies