IT security

More than ever have you heard about Computer Security, but do you really know how important it is to an organization ?

This includes data integrity, data backup, data access control, software and operating system updates, network access control, user identification, among other important actions.

It’s also physical access to the infrastructure. If you still have a computer room inside your walls, no one should be able to get in. It’s This place should not also serve as a broom closet!
With messaging, for example. The majority of attacks are in the form of fraudulent emails. These emails ask recipients in the company to click on a link, which will open the doors to hackers. This is called "phishing". Awareness and training of company employees is essential to stop these attempts.

One of the most used tactics is the attack by "Social Engineering". Example: by getting a key person’s name and surname from the company over the phone, the hacker will be able to reconstruct their email address (firstname.name@company_name.com) and send them a fraudulent email.

Once the hijacker enters the company’s internal network, it can remain discreet to monitor and steal data at the right time. But it can also abruptly make all your data unreadable (encrypted). You are then asked to pay a ransom in exchange for the key capable of putting your data back into a readable state. You are then a victim of what is called a "ransomware", the software that encrypted your data. A crucial question at the moment is: who can assure you that once the ransom is paid, the pirate will give you the key? Give you the right key to make your data readable?

You can trust on DCS in your daily struggle to ensure computer security.
- DCS may be responsible for the daily monitoring of backups
- Log reports, publications of software and hardware fixes, in order to alert you and decide with you the actions that are imposed.

DCS will help you make a point about your backups. Example: the 3-2-1-0 rule.

And it will support you to :
• implement the good practices recommended by the Swiss Confederation (NCSC).
• taking stock of its IT infrastructure on a regular basis to reflect recent changes.