The expert is categorical, this is the number 1 rule in cybersecurity. A strong password is long, contains letters and numbers, lower and upper case letters, and symbols, and does not apply to every site you visit. “First of all, we don’t share it. Then sun123 or writing the password on the desk is a bit like giving it as a gift,” he explains. The excuse of doing this out of fear of forgetting is also not legitimate, because there are many password managers. Another rule is that each employee must have an exclusive account. This makes it easy to know who accessed what and when. “We always imagine the cyber threat externally, but it can also come internally,” confirms the expert.

Mathieu Hinse believes that companies have every interest in limiting access to computer data. For him, these should be available depending on the role the employee occupies in the company. “You are not part of the accounting department, you do not need to have access to the data that is in the payroll information bank. It’s the good old chain of who has access to what. »

Another important rule is to regularly update your equipment and software to correct security vulnerabilities. Same thing with antiviruses. Besides, those bought at the local stationery store are not always infallible. “There are millions of new viruses every year. It is better to ensure that antiviruses are effective and updated regularly. If you don’t know how to do it or what to choose, you can refer to a firm specializing in the field,” advises the professional. He adds that it should not be seen as an expense, but as an investment. “You can’t even imagine what it can cost in the event of a cyber attack. It can even put businesses at risk, so prevention is better than cure. »

Email phishing continues to be a very popular method for fraudsters. You must always be attentive to clues casting doubt on the real origin of the email, particularly if the message includes an attachment or presents an inconsistency in form or substance. Even if the sender is the correct one, they could also, without their knowledge, send you an infected email. “We are wary of urgent requests, which require confidential information or which recommend that you keep it secret, etc. Anything that makes you doubt should lead you to contact your interlocutor to verify that they are the originator of the message. »