91% of French companies were impacted by cyber-attacks in 2020.
More than 9 out of 10 companies: an alarming figure that demonstrates the scale of the threat from malware, which is developing at high speed. Today, two of these threats are in the spotlight. The much talked-about phishing phenomenon. These threats mimic websites or emails from official organisations (banks, administrations, etc.) to mislead users and absorb their personal data. The more aggressive ransomware phenomenon. Ransomware infiltrates computers and smartphones, encrypts all data and makes the terminal unusable. To fix it, you have to pay. Hence the name "ransom". Today, almost all companies and employees are equipped with computers and have several terminals (smartphones, laptops etc.). With the advent of the digital age and digital transformation, companies have become easy prey.
Any questions ?
Telephone: +33 (0)1 53 38 20 50
The violence of the attacks has also changed. Malware is becoming more sophisticated and polymorphous. The material damage caused by these attacks and the resulting financial losses are therefore much greater. The increase in attacks and their violence has accelerated the awareness of States and government bodies. Rethinking how to protect oneself against these new digital realities was vital. The implementation of the General Data Protection Regulation (GDPR) is one of the most concrete examples of this global challenge. The European Unionhas therefore decided to protect users’ data on the Internet and social networks, but more significantly, forces companies to comply with multiple restrictions by setting new structural security standards. As a new digital and contemporary challenge, high quality and durable security has become a daily imperative for all companies, from SMEs to large international groups.
Information system security needs:
- Access control to information systems;
- Network monitoring: sniffers, intrusion detection systems;
- Application security: separation of privileges, code audits, reverse engineering;
- Use of ad hoc technologies: firewalls, UTMs, anti-malware (antivirus, anti-spam, anti-spyware);
- Cryptography: strong authentication, public key infrastructure, encryption.
- Business Continuity Plans: Data Backup and Restore, Business Resumption Plans.
- Email protection.