{"id":4759,"date":"2021-05-11T14:21:28","date_gmt":"2021-05-11T12:21:28","guid":{"rendered":"https:\/\/novalliance.net\/espace\/?page_id=4759"},"modified":"2025-11-21T09:39:15","modified_gmt":"2025-11-21T08:39:15","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<h1>SECURITY&nbsp; : GOOD PRACTICES<\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-4762\" src=\"https:\/\/novalliance.net\/espace\/wp-content\/uploads\/sites\/5\/2021\/05\/security-icon1-250x250-1.png\" alt=\"\" width=\"84\" height=\"84\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-icon1-250x250-1.png 250w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-icon1-250x250-1-150x150.png 150w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-icon1-250x250-1-170x170.png 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-icon1-250x250-1-221x221.png 221w\" sizes=\"auto, (max-width: 84px) 100vw, 84px\" \/><\/p>\n<p>While digital is now integral part of personal and professional lives, security is rarely taken into account in our uses. The new technologies, omnipresent, however, carry new risks that weigh heavily on companies. For example, the most sensitive data (costumer files, contracts, projects in progress&#8230;) can be stolen by attackers computer or recovered in case of loss or theft of a smartphone, a tablet, a computer portable.<\/p>\n<p>These incidents are often accompanied by severe repercussions in terms of security, economic and financial losses and the deterioration of the company&#8217;s image. These dangers can nevertheless be greatly reduced by a set of good practices, inexpensive or even free, and easy to implement in the company.<\/p>\n<p>While this end, the awareness of employees of the company to the rules of computer hygiene is fundamental and above all very effective in limiting a large part of the risk.<\/p>\n<\/p>\n\n\n<div class=\"wp-block-columns mb-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column mb-0 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/web-and-social-networks\/\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-web1.png\" alt=\"\" class=\"wp-image-22844\" style=\"width:65px;height:65px\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-web1.png 225w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-web1-150x150.png 150w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-web1-170x170.png 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-web1-221x221.png 221w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column mb-0 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/take-care-with-emails\/\"><img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"250\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-email-250x250-2.png\" alt=\"\" class=\"wp-image-22854\" style=\"width:54px;height:54px\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-email-250x250-2.png 250w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-email-250x250-2-150x150.png 150w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-email-250x250-2-170x170.png 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-email-250x250-2-221x221.png 221w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/a><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column mb-0 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/verrouillage-de-session\/\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-access.png\" alt=\"\" class=\"wp-image-22859\" style=\"width:77px;height:77px\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-access.png 225w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-access-150x150.png 150w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-access-170x170.png 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-access-221x221.png 221w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/a><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column mb-0 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/strong-password\/\"><img loading=\"lazy\" decoding=\"async\" width=\"227\" height=\"222\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-password3.png\" alt=\"\" class=\"wp-image-22864\" style=\"width:54px;height:53px\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-password3.png 227w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/security-password3-170x166.png 170w\" sizes=\"auto, (max-width: 227px) 100vw, 227px\" \/><\/a><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/psono-password-manager\/\"><img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"250\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/psono-250x250-1.png\" alt=\"\" class=\"wp-image-22871\" style=\"width:65px;height:65px\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/psono-250x250-1.png 250w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/psono-250x250-1-150x150.png 150w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/psono-250x250-1-170x170.png 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/psono-250x250-1-221x221.png 221w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/a><\/figure>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center mt-0 has-black-color has-text-color\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/web-and-social-networks\/\" data-type=\"URL\" data-id=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/web-and-social-networks\/\">WEB, SOCIAL MEDIA<\/a><\/mark><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center mt-0\"><strong><strong><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/take-care-with-emails\/\" data-type=\"URL\" data-id=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/vigilance-avec-les-courriels\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">EMAIL<\/mark><\/a><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center mt-0 has-black-color has-text-color\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/verrouillage-de-session\/\" data-type=\"URL\" data-id=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/verrouillage-de-session\/\">SESSION LOCK<\/a><\/mark><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center mt-0\"><strong><strong><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/strong-password\/\" data-type=\"URL\" data-id=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/mots-de-passe-fort\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">STRONG PASSWORDS<\/mark><\/a><\/strong><\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-black-color has-text-color\"><strong><a href=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/psono-password-manager\/\" data-type=\"URL\" data-id=\"https:\/\/novalliance.net\/espace-prive\/en\/computing\/cybersecurity\/psono-password-manager\/\">PSONO PASSWORD MANAGER<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<p>You may therefore be asked to participate in awareness modules, short e-learning sessions lasting no more than 5 minutes, which will be sent to Teams discussions by Mantra and its cyber coach, \u201c<strong>Alex from Mantra.<\/strong>\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"432\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration-1024x432.jpg\" alt=\"\" class=\"wp-image-71305\" style=\"width:566px;height:auto\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration-1024x432.jpg 1024w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration-300x127.jpg 300w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration-768x324.jpg 768w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration-170x72.jpg 170w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2025\/11\/mantra_illustration.jpg 1268w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0eb7f0\"><strong><strong>SEND &#8211; SECURE FILE TRANSFER<\/strong><\/strong><\/h2>\n\n\n\n<p>We would remind you that the use of free websites such as \u2018WeTransfer\u2019 is prohibited for professional purposes for security reasons.<\/p>\n\n\n\n<p>To help you, you can use a new secure transfer tool<br>hosted on the Novalliance Group&#8217;s internal infrastructure.<\/p>\n\n\n\n<p>Open your browser and type in the address <a href=\"https:\/\/send.novalliance.info\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/send.novalliance.info<\/a><\/p>\n\n\n\n<p>Once you have added the file(s) to be transferred<br>copy and share the link via an email message or a Microsoft Team conversation<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color\" style=\"color:#0eb7f0\"><strong><strong>FOCUS ON PHISHING<\/strong><\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"268\" height=\"196\" src=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/phishing_illustration-268x196-1.png\" alt=\"\" class=\"wp-image-22874\" srcset=\"https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/phishing_illustration-268x196-1.png 268w, https:\/\/novalliance.net\/espace-prive\/wp-content\/uploads\/sites\/5\/2021\/05\/phishing_illustration-268x196-1-170x124.png 170w\" sizes=\"auto, (max-width: 268px) 100vw, 268px\" \/><\/figure>\n<\/div>\n\n\n<p><strong><strong>Definition<\/strong><\/strong><\/p>\n\n\n\n<p>&#8220;PHISHING&#8221; is a technique that consists of luring you to communicate professional, personal (access accounts, passwords&#8230;) and\/or banking data by pretending to be a trusted person or organization. Phishing is a social engineering attack based on trickery, habits and emotions (fear, trust, desire to help, etc.).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Method<\/strong><\/p>\n\n\n\n<p>To be credible, hackers use &#8220;spoofing&#8221;, i.e. they usurp the name and image of a known legitimate authority, in order to send false information relating to technical support or surfing on &#8220;trendy&#8221; news (e.g. rumors on social networks, reimbursement of energy suppliers, false advertising, false virus alerts, new laws to consult&#8230;).<\/p>\n\n\n\n<p>Attacks take place using different communication channels: email, SMS and also WhatsApp instant messaging.<\/p>\n\n\n\n<p><strong><strong>Objectives<\/strong><\/strong><\/p>\n\n\n\n<p>The objectives of hackers are to collect information about you or your company in order to :<\/p>\n\n\n\n<p>Harm you personally or your business through the insertion of malicious code: in this case, phishing is the prelude to a more in-depth attack ;<\/p>\n\n\n\n<p>Recover your know-how (economic, political, industrial or intellectual property espionage);<\/p>\n\n\n\n<p>Resell your information ;<\/p>\n\n\n\n<p>Money theft.<\/p>\n\n\n\n<p><strong><strong>How can I avoid being phished?<\/strong><\/strong><\/p>\n\n\n\n<p>I don&#8217;t click on links and\/or attachments from suspicious senders.<\/p>\n\n\n\n<p>I check the website address and links by hovering over them with the mouse (without clicking on them!).<\/p>\n\n\n\n<p>I type the official website address myself.<\/p>\n\n\n\n<p>I carefully check the message (sender and content) and I redouble my vigilance when the message is alarmist and requires urgent action (payment, sending personal information, change of bank-account number etc.).<\/p>\n\n\n\n<p>I don&#8217;t follow up on a suspicious SMS prompting me to call or connect from my phone.<\/p>\n\n\n\n<p>I do not communicate personal and\/or professional information (no serious administration or commercial company asks to check bank details or passwords by e-mail or telephone)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SECURITY&nbsp; : GOOD PRACTICES While digital is now integral part of personal and professional lives, security is rarely taken into account in our uses. The new technologies, omnipresent, however, carry new risks that weigh heavily on companies. For example, the most sensitive data (costumer files, contracts, projects in progress&#8230;) can be stolen by attackers computer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4753,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"template-content.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4759","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/pages\/4759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/comments?post=4759"}],"version-history":[{"count":19,"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/pages\/4759\/revisions"}],"predecessor-version":[{"id":71311,"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/pages\/4759\/revisions\/71311"}],"up":[{"embeddable":true,"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/pages\/4753"}],"wp:attachment":[{"href":"https:\/\/novalliance.net\/espace-prive\/en\/wp-json\/wp\/v2\/media?parent=4759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}