Montpellier: Computer security for all

A digital security awareness workshop was held on Monday, March 21st at the Atelier des Pigistes (Rue Frimaire), one of the buildings of the Occitanie Press Club. (© Pixabay / PixxlTeufel)

Seeing your electronic device infected with a virus or your personal data stolen: a nightmare for many. However, there are ways to reduce this risk, even if it cannot be eliminated.

Pascal ArnaultPresident Montpel’libre . AssociationAnd the Myriam KrickittSecretary General of Montpelle Libre, responsible for development and legal and administrative reference Monday March 21 Some tips during the digital security awareness workshop.

Passwords, the basis of computer security

First of all, it is recommended that you choose A different password for each access To reduce damage in case of hacking. It can be impressive.

“For hackers, it is enough to control 20 people’s access to gain access to more than 500,000 others because all the information is interfering with each other. This is especially valid in the field of health.”

Pascal ArnaultPresident of the Montpelle Libre Association

It is also recommended to choose a password that respects some rules For extra security:

  • between 8 And the 12 Personalities
  • Mix uppercase and lowercase letters, numbers and special characters
  • No password related to self (first name, last name, date of birth, etc.)
  • There are no words from the dictionary because the program can decode them easily

If your password needs to be particularly strong, it’s That’s from the mailbox Because it hosts other password reset links. If the hacker gains access to it, they can control all other accounts. It is clearly necessary Avoid contact Its password is for a third party.

See also  Shoes, tools, gear ... Christmas gift ideas for runners

Make regular updates

Even if many tend to put off the deadline, Software and operating systems must be It is updated frequently. For Pascal Arnaud, this is fundamental manipulation: “There may be security breaches and hackers can take control from a distance.”

Montpel’libre chief even believes that Vaccination passport check They involve risks at this level: “We don’t know which device the interviewees are passing the vaccine to. If their cell phones have security holes because they haven’t been properly updated, our data could be at risk.”

Videos: Currently in Actu

Another important thing: Anticipate idle periods To schedule updates so that they continue to run. distrust too Questionable Updates offered online.

Connected objects: not too innocuous tools

frequently, Connected Objects Interesting and can take the form of small, friendly and harmless looking gadgets. However, this is just an appearance, says François Arnault: “We tend to buy tools because they look fun but you have to be careful where they come from.”

Information about its builders is usually scarce, which can represent a risk. One Abandoned Connected Equipment, like a USB drive lying on the floor on the street, should never be used because its contents are unknown. It is also not recommended to use a file Wifi in public areas, generally dangerous because of its easy access. So it is easy for cybercriminals to control it.

If there is no choice but to use public Wi-Fi, it is better Avoid sensitive transactionsNot to mention filing tax returns, credit card payments, or confidential information information. Damiana young programmer participating in an awareness-raising workshop, admits he doesn’t always care about “these kinds of little things”.

See also  Black Friday: l'Oral-B iO Series 8n est à -59%

Firewall and Antivirus: Computer Protection Tools

For protection against malware, nothing is better than a benefit Firewall and one Antivirus effective. These block most viruses, including Trojans.

This special type of virus makes it possible to hide malware inside other seemingly harmless programs. Sometimes hackers directly deceive users into downloading them.

Don’t (always) open your emails

Viruses can also hide in email messages. Their favorite teacher: Suspicious links and attachments. C’est pourquoi il faut éviter de les ouvrir puisqu’il s’agit d’une technique dite d’hameçonnage qui vise à récupérer les données d’un individu en lui faisant croire institution qu’il ou une dress trust.

To protect yourself, nothing could be simpler: Contact the sender of the email directly If in doubt. Same if the mail sender has unusual behavior or a different way of expressing himself than usual.

Separate personal and professional

essential element Whereas, as Myriam Cricket, Secretary General of Montpelle Lieber, laments, “the boundaries between personal and professional life are becoming increasingly porous.”

Ideally, users should have Professional and personal device. Less complicated setup tip: Use a file Different operating system according to the uses. For example, Pascal Arnoux recommends working on Windows while sharing vacation photos on Linux. Thus, if one of the two tools is hacked, the other is safe.

the same for social networks. It is more than forbidden to share personal content on professional networks so as not to risk harming the integrity of the employer.

Always apply the rule of ‘least privilege’

Often, multiple individuals can access the same workstation through sessions special to. The person to whom the instrument belongs must always apply what Pascal Arnaud calls it The rule of ‘least privilege’.

See also  The logical consequence of a great tool: Think beautiful, treat AirPods like Apple Watch

Thus, other users should have the lowest level of permissions possible so that they cannot perform risky operations with the device. This principle Especially suitable for children, who can perform manipulations without thinking of harm. Big problem when they click a simple button to advance in a game but this results in several hundred Euros being deducted from their parents bank account!

Therefore, they should be given more freedoms only if they really need it. Especially for a school assignment.

Practical advice, but not infallible

Pascal Arnaud still wants a quick reminder: “100% security doesn’t exist.”

Despite everything, these few seemingly basic but very useful tips can significantly extend the life of digital devices.

Was this article useful to you? Note that you can follow the Métropolitain in the Mon Actu space. With one click, and after registration, you will find all the news of your favorite cities and brands.

Samantha Arnold

<p class="sign">"Web fanatic. Travel scholar. Certified music evangelist. Coffee expert. Unapologetic internet guru. Beer nerd."</p>

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top