1. Work in the Cloud
    Don’t let these software take control of your digital activities and therefore work in the cloud as much as possible. You can work on joint projects with your colleagues via remote desktops, such as SharePoint for example. Office 365 is also a tool that allows you to share files, access them from multiple devices,… And all this in complete security (protection thanks to built-in protection against viruses, spam and phishing attacks, etc.).
  2. Beware! Beware!
    Never open a link or attachment in an email without checking its origin. As these are often false invoices or delivery notes that do not appear suspicious, each of us can easily fall into the trap. Do not underestimate your employees’ awareness of the various risks that can infect your network. Whether they come from a site or an email, attacks are becoming more and more sneaky and hackers pretend to be a dissatisfied supplier or customer, with an attached file. A well-informed person will be able to rule out the risk, warn colleagues or find out before downloading anything.
  3. Make backups of your data
    Make regular backups of your data. Also make sure to perform recovery tests, to make sure that you can easily recover all these files.
  4. Work on a recent and up-to-date operating system
    Make sure your company’s computers and tablets are equipped with the latest operating system, and ensure new updates. Updates are the basis of your protection whether server(s), client machine(s), firewall, email gateway,… All these equipments must be properly maintained in order to be able to offer an optimal defense of your infrastructure. Regular maintenance will keep the risk level as low as possible.
  5. Activate the Bit Locker
    Also activate the Bit Locker on your computers, an additional security available in W10 and free of charge.
  6. Ensure the security of your passwords
    – Do not send a password by e-mail
    – Do not store important passwords in an unencrypted file
    – If in doubt, perform a password reset

Category
Tags

Comments are closed