X
Datacenter services
Email solutions
Hosting solutions
Want to customize your architecture?
Ask our technical experts Contact us
Communication
Infrastructure
Telework involves employees using their own internet devices. Personal computers and smartphones are operated to ensure the continuity of business activities. From a purely practical point of view, this is an excellent solution. Where the problem is that security is not as successful as that enjoyed by professional servers.
Companies' computer systems are windowed by personal machines. These are more accessible to hackers who hack the data even before they reach the secure hosting server.
However, the rate of cyber-malice is already very high in France. In 2018, when the RGPD came into force, the rate was already over 80%, according to data provided by the Ministry of the Interior. Since March 2020, the government platform dedicated to digital risk assistance and prevention has recorded a 300% increase in attendance according to the confidences of its CEO Jérôme Notin. These figures call for increased vigilance, knowing that acts of malice take different forms.
Zero risk may not exist, but it is possible to optimize data protection by adopting the right reflexes.
Individual vigilance is essential. To begin with, each employee must get into the habit of activating his VPN and updating all his software, especially antivirus. It is also important to check the senders of the emails before they open and especially before clicking on a link or opening/downloading an attachment.
When confidential data needs to be exchanged, it is essential to secure it as much as possible. This avoids the use of public Wi-Fi networks that are vulnerable to spyware and other computer attacks. Encryption is crucial for business emails.
When employees use their personal machines, it is imperative to use an encrypted partition of the hard drive to protect the stored data. At the same time, it is essential that each user has access to a backup system, in other words a backup of business data.
In addition, the design of a safeguarding strategy must be done in consultation with the technical teams and with the support of the legal teams. It is crucial to assess the risks to which the company is exposed in relation to the types of services provided, the information collected about partners/clients.... As much as possible, it is better to prohibit or not to limit external access to the computer system (customers, suppliers...). The less external access there is, the less risk of intrusion.
An internal messaging service is more than advisable. By adopting such a solution, it is easier to protect content and data, regardless of the computers and devices used. Dual-factor authentication systems are obviously preferred because they offer better protection than traditional passwords.
When a device is hacked or, at best, down, you automatically lose access to the saved files. Despite the quality of the recovery software used, there is never an absolute guarantee that the data on the defective media can be used again. Photos, accounting files, presentation videos, personal cards... everything can be lost in the blink of an eye. The backup must therefore be a reflex and be applied systematically, even automatically.
Nothing beats a custom backup, which is why it's important to compare multiple solutions before you select one. The choice should not be made in haste, even if securing enterprise IT data is a top priority.
Adopting the BaaS (Backup As A Service) is about taking advantage of cloud backup solutions. In other words, a duplicate of the company's servers is created and then regularly updated. There are many solutions tailored to different volumes of data, the principle being the same: increase security.
Vigilance is required because there are public and private safeguarding solutions. In a business environment, private cloud infrastructure is indicated. Again, many options are available. It is therefore essential to select a French company offering data hosting in France. This is the best option to guard against outside interference and thus to ensure the sovereignty of the data.
In addition to a judicious backup, praged should be provided for restoration. The BaaS offers both services at the same time. If data on business/personal machines are lost or deteriorated, copies stored in the cloud can be activated. The business recovery plan is therefore effective insofar as the recovery in question takes place very quickly. It is not mandatory for the machine infected with a virus or to restart for the data to be recovered. Depending on the selected provider, it is possible to start a virtual machine in the cloud and thus intervene on the data.
Accompanying measures must, of course, accompany the adoption of the BaaS.
Secure backups are systematic within companies but less so when personal computers and mobile devices are operated. It is therefore essential to adjust the backup policy on all devices connected to the company's network. Every user must benefit from efficient solutions to record data on their device and then ensure a protected export to the cloud.
Early identification of fixed and mobile devices is required. It's not just computers, tablets, and smartphones! Removable storage devices should also be considered if they contain important information.
Professional antiviral solutions should be preferred in a context where telework is becoming more widespread. Standard protections are not enough to secure files created and stored on personal devices. It will therefore be wise to take over the subscriptions so that the initial installations and updates run in accordance with the security requirements imposed by your activities.
It is quite possible to automate everyday tasks, such as computer backup. As no human intervention is necessary, the company protects itself against the risks of forgetfulness that can prove disabling or even fatal in terms of safety.
The frequency of backups varies; hourly, weekly, monthly... not to mention the possibility of systematically exporting sensitive data to the cloud. It is therefore necessary to compare the services offered, always in relation to the risks incurred by the company if the data ever falls into the wrong hands.
Automatic backups can be done perfectly via mobile stations such as computers installed in your offices. The parameters must therefore be adapted according to the modes of use, the nature of the data and other factors to identify the level of risk of each machine.
It should be noted that a backup of all files without exception is not always necessary. As a result, some low-value data may deviate from the rule. Their identification, of course, requires careful analysis. For this, it is advisable to prioritize data in order of importance. This identifies data that does not cause a major problem in the event of loss or degradation.
Following the same logic, it is recommended to offer tailor-made levels of protection to the different data backed up. Providing custom access codes to users already reduces risk. At the same time, it is possible to install alert software that warns administrators of any attempt to intrusion into the system. These alerts trigger as soon as an unauthorized person attempts to access files.
Virtual and physical media can be accompanied by a more or less important lifespan. This is a detail that must be considered before selecting the claimant. In some cases, the data is stored within a time limit (5 years, 10 years...). In others, you get a lifetime backup and therefore decide which files to delete or not depending on their usefulness.
The restoration time in case of computer attacks will be optimized if you are planning blank machines. In other words, the drive must be completely empty, which does not exclude the need to offer all the necessary protections to each machine. We are talking about a system image ready to receive complete data and software in very short time, which is once again part of the policy of resuming activities.
The BaaS offers the prospect of receiving a continuous update at low cost, or even free of charge depending on the provider selected. As a result, the functionality of the applications essential to the activities is optimized in real time. In fact, it is important to ensure that software that allows files to be opened and used is also backed up. This saves valuable time if a restoration is required following a computer problem.
Sometimes the backup process doesn't go as it should. For more assurance, it's best to test backups on a regular basis. These tests can take the form of a copy of the files backed up on your computer. After that, you have to check that each file is properly usable (opening, editing...).
It is also advisable to test copies directly in backup centers. This precaution allows you to evaluate the restoration times, the levels of protection available to physical servers and more.
The absolute need to protect your business data from cyberattacks and other potential sources of loss/degradation does not preclude her obligation to comply with legislation. Personal data is mainly concerned.
The General Data Protection Regulation (GDPR) strengthens people's rights. It should be noted that different approaches to the National Commission for Information Technology and Freedoms (CNIL) are being abolished. Only sectors that are attractive to justice and health still have to apply the formalities in force before 2018. In return, companies must comply with their data collection, analysis, processing, and exploitation policy under the RGPD. The guidelines are available on the CNIL website regarding enforcement on European territory.
Section34 of Act 78-17 of January 6, 1978, amended by Order No. 2018-1125 of December 12, 2018 - art. 1 also provides additional information. Since criminal liability may be incurred depending on the nature of the data stored, it is mandatory to comply with the provisions ofArticle226-17 of the Penal Code. Sections 1240 and 1241 of the Civil Code should also be considered, knowing that personal data collected and stored can be harmful. Other texts and laws can obviously serve as a reference, but it is preferable to consult legal experts so that the safeguard ensures the protection of the company from all points of view.
Laws vary from country to country. This involves applying variable measurements depending on the backup platform selected. The references mentioned above are, for example, adopted in France, which does not make them compulsory in other states. This is the importance of speaking to a French law provider as mentioned above. Not only is there a guarantee that the existing legislation will be enforced, but the management of any problems will also take place with greater flexibility.
Any company or organization must adopt a tailor-made security policy. The various strategies put in place will then be communicated to employees who will have to apply them in the present and telework. By combining the efforts, managers and employees contribute together to the protection of the computer data of the company concerned.