IT security of enterprise systems: the importance of training employees in the best practices of cyber security

As a result of the global health crisis, habits have changed markedly. This is true even in terms of working methods. According to a study by Odoxa-Adviso Partners, one in five companies has a particular penchant for working remotely, a practice that due to general confinement has gradually developed and settled into my professional habits. However, an important fact should not be overlooked if from the beginning has been reported by security experts.

This article will also interest you: Cybersecurity at the heart of the business recovery

The question of the fragility of information systems in the face of telework is not lacking. In addition, there has been a fairly significant increase in security breaches on the corporate side. According to the firm specializing in the provision of security solutions barracuda networks, there was a 667% increase in phishing attempts only between March 1 and 23. Attempts that focused on the coronavirus pandemic.

Faced with the growing threat, some specialists such as Cnam and Biblos Group have come together to raise awareness, train and protect remote workers from the various risks that surround companies during this rather murky period. So they observed an underestimated assessment of computer risks. Olivier Kauf of Biblos group noted: "Our companies, hard hit by the health crisis, have provided remote access to their employees. The latter, focused on their new work tools, have without being aware of it, paved the way for hackers: from the theft of private and professional data to the deprivation of their computer devices (portables, computers, etc.), hackers exert considerable moral pressures: mass sending of malicious emails, blackmail, manipulation, false transfer orders and even ransom demands. ». In a sense, the vulnerability here is simply the employees and the companies themselves. There is no consideration of certain requirements, not to mention the lack of knowledge of some people involved directly in the management of computer networks. The lack of approved equipment has a lot to do with it as well.

However, this problem is likely to get worse. In fact, almost 73% of employees surveyed expressed a desire to continue working from home. 42% for part-time telework and 31% for full-time telework. While we know that not all companies are the same in the face of the threat of cyber malice. In practice, large companies have managed to anticipate and even implement a system that is efficient enough to continue to function properly despite the difficulties caused by the health crisis. This is not the case for mid-sized and small and medium-sized enterprises. Unfortunately, they have had to set up a system urgently, often to the detriment of some basic rules of cybersecurity. In particular, the training of employees, technicians and even managers. That's what made them even more vulnerable to the cyber threat. "The threat is not reserved for large terabyte consumer groups with very long mailing lists; it also hovers over SMEs and PMIs, which are often less protected and whose employees have little awareness of good practices. We can guard against attacks, but to do that, we must be vigilant, train our employees, better train them to manage digitally dangerous situations." Byblos Group President Simon Hoayek recalled.

By this observation allowed Byblos Edge, the Subsidiary of the French cybersecurity company, the Byblos Group, in partnership with Cnam, to develop and this training program in cyber training. The aim is simply to bring enough knowledge to the cybersecurity level, and to provide training that allows direct and indirect actors to be able to use all the networks of their company without the presentation.

The program takes a whole day in family are convenient, whose operation is based on distance courses. Training provided by Cnam specialists, "effectively prepares employees for digital nomadism through training that is very oriented on the daily practices of Internet users: private and professional data management, digital identities, e-mails and e-mails, e-payments, downloads, connected objects and network and wifi exchanges. according to Olivier Kauf.

Now access an unlimited number of passwords:

Check out our hacking software