Protect your devices
A poorly protected workstation can jeopardize not only the information that is processed on the workstation itself, but also the systems to which it connects. Once hacked, it can become a gateway to more sensitive systems once spyware may have been installed without the user's knowledge. The IT support team is mandated by the Unit Director to enforce the technical measures relating to the security regulations.
The behavior of the user of this workstation is essential, if he applies the basic security rules, it will strengthen the security of this workstation and all the systems to which he connects or, on the contrary, if he does not observe these rules, it will facilitate the work of hackers and undermine the efforts of the entire community of work.
The Unit Director is responsible for the security of the information systems of his unit, he is responsible for making known and enforcing the security regulations (security policies, charters, rules) promulgated by the guardianships to which he depends.
It is essential that the basic security rules are known and implemented by the IT team and users, they are based on:
- Technical protection of the workstation
- Systematic data backup
- Configuration mastered and updated regularly
- Encryption of storage media (mobile workstations, keys, disks, etc.)
- Informed user behaviour
- Protection of his workstation against theft and illegitimate access
- Strong and personal passwords
- Cautious attitude towards removable data carriers (USB sticks, etc.)
- Prudent use of the Internet (downloads, use of online services)
- Cautious attitude towards received messages
- Alert of technical managers and security in case of abnormal event