{"id":852,"date":"2022-04-04T23:31:18","date_gmt":"2022-04-05T04:31:18","guid":{"rendered":"https:\/\/www.commtech.ca\/securite-informatique\/"},"modified":"2022-05-12T02:52:52","modified_gmt":"2022-05-12T07:52:52","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/commtech.ca\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity\u00a0"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-852\" data-postid=\"852\" class=\"themify_builder_content themify_builder_content-852 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_yq4v378 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_uu6x380 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_5a5k271   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2 id=\"block-65e95f05-9e5c-421c-9169-e01dd7073241\" class=\"block-editor-rich-text__editable block-editor-block-list__block wp-block is-selected wp-block-heading rich-text\" tabindex=\"0\" role=\"document\" contenteditable=\"true\" aria-multiline=\"true\" aria-label=\"Bloc&amp;nbsp;: Titre\" data-block=\"65e95f05-9e5c-421c-9169-e01dd7073241\" data-type=\"core\/heading\" data-title=\"Titre\">Is your business at risk?<\/h2>\n<p>There are many cyber threats, and it\u2019s very difficult to get a sense of the magnitude of them. Whether it\u2019s really to undermine your business or simply to use your IT resources for another purpose, your environment is constantly under attack. In order to protect your business from these hazards, it is first necessary to understand their sources. Then, familiarize yourself with the various tools available to you in order to enjoy a more secure computing environment.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_kv8s525 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_3 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col3-1 tb_b1x3526 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_ijz0601   \" data-lazy=\"1\">\n    <h3 class=\"module-title\">Different threats to watch.<\/h3>    <div  class=\"tb_text_wrap\">\n        <p><!-- wp:paragraph --><\/p>\n<p>A computer can be contaminated in many ways. Spam is an unwanted email that usually contains advertising. However, some of these messages can pose a threat. Phishing is the act of deceiving the recipient by luring them to fake sites where their password and other confidential information will be retrieved. It is also possible to contaminate a company\u2019s computer equipment by downloading files or software updates from unprotected computers or websites, as well as from any unaudited external devices.<\/p>\n<p><!-- \/wp:paragraph --><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col3-1 tb_8qej839\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_h6y9402   \" data-lazy=\"1\">\n    <h3 class=\"module-title\">The tools at your service.<\/h3>    <div  class=\"tb_text_wrap\">\n        <p><!-- wp:paragraph --><\/p>\n<p>While no method is foolproof, there are many ways you can protect your company\u2019s IT environment. Install routers first, to better control the incoming and outgoing ports of your network, as well as firewalls, which will filter traffic and block some websites. Also provide your devices with antivirus software and your mail system with a spam filter. In addition, it is important to establish a security policy within your company. Make sure you manage access to your shared file directories and choose good passwords, ideally containing uppercase, lowercase, numbers and symbols.<br \/><!-- \/wp:paragraph --><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col3-1 tb_otnh840 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_vasn552   \" data-lazy=\"1\">\n    <h3 class=\"module-title\">It's better to be safe than sorry<\/h3>    <div  class=\"tb_text_wrap\">\n        <p><!-- wp:paragraph --><\/p>\n<p>Equally important is the implementation of a recovery solution. In case of data loss, for example, make sure not only to back up all your essential data, but also to test the reliability of it. It is recommended to sync your data in the cloud, using a secure cloud service provider. Have a succession plan in place in the event of a disaster or loss of computer equipment. Creating a replica of your machines and servers, backed up on the cloud, helps avoid any loss of hardware-based data.<br \/><!-- \/wp:paragraph --><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_1n6a898 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_5m1q899 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_c94o145   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><!-- wp:paragraph --><\/p>\n<h3>Expert&#8217;s advice<\/h3>\n<p><!-- \/wp:paragraph --><!-- wp:paragraph --><\/p>\n<p>According to Dominic Martine, co-owner of Commtech, it is essential to know the various threats that circulate, such as malware, phishing attempts and networks of zombie machines (computers infected, for malicious purposes, by a worm or a Trojan horse, which then attack other computers) and regularly update their knowledge as these threats evolve rapidly. To protect your IT environment, contact a specialized firm. They will test their safety, both from the outside and from the inside, then provide you with a safety audit and help you develop an action plan to prevent hazards.<br \/><!-- \/wp:paragraph --><\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>There are many cyber threats, and it\u2019s very difficult to get a sense of the magnitude of them. Whether it\u2019s really to undermine your business or simply to use your IT resources for another purpose, your environment is constantly under attack. In order to protect your business from these hazards, it is first necessary to understand their sources. Then, familiarize yourself with the various tools available to you in order to enjoy a more secure computing environment.<\/p>\n","protected":false},"author":1,"featured_media":180,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","footnotes":""},"categories":[20],"tags":[23],"class_list":["post-852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity\u00a0 - Commtech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/commtech.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\u00a0 - Commtech\" \/>\n<meta property=\"og:description\" content=\"There are many cyber threats, and it\u2019s very difficult to get a sense of the magnitude of them. Whether it\u2019s really to undermine your business or simply to use your IT resources for another purpose, your environment is constantly under attack. In order to protect your business from these hazards, it is first necessary to understand their sources. Then, familiarize yourself with the various tools available to you in order to enjoy a more secure computing environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/commtech.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Commtech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/commtechinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T04:31:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-12T07:52:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"commtech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"commtech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/\"},\"author\":{\"name\":\"commtech\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#\\\/schema\\\/person\\\/8602ed63b4d24908d4bbcc3057f1f47e\"},\"headline\":\"Cybersecurity\u00a0\",\"datePublished\":\"2022-04-05T04:31:18+00:00\",\"dateModified\":\"2022-05-12T07:52:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/\"},\"wordCount\":1,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/pexels-christina-morillo-1181396.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity\u00a0 - Commtech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/pexels-christina-morillo-1181396.jpg\",\"datePublished\":\"2022-04-05T04:31:18+00:00\",\"dateModified\":\"2022-05-12T07:52:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/pexels-christina-morillo-1181396.jpg\",\"contentUrl\":\"https:\\\/\\\/commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/pexels-christina-morillo-1181396.jpg\",\"width\":1280,\"height\":854},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/commtech.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/commtech.ca\\\/en\\\/\",\"name\":\"Commtech\",\"description\":\"Informatique\",\"publisher\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/commtech.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#organization\",\"name\":\"Commtech\",\"url\":\"https:\\\/\\\/commtech.ca\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/commtech_logo.png\",\"contentUrl\":\"https:\\\/\\\/www.commtech.ca\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/commtech_logo.png\",\"width\":1688,\"height\":352,\"caption\":\"Commtech\"},\"image\":{\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/commtechinfo\\\/\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/commtech-informatique\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/commtech.ca\\\/en\\\/#\\\/schema\\\/person\\\/8602ed63b4d24908d4bbcc3057f1f47e\",\"name\":\"commtech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g\",\"caption\":\"commtech\"},\"sameAs\":[\"https:\\\/\\\/commtech.ca\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity\u00a0 - Commtech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/commtech.ca\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity\u00a0 - Commtech","og_description":"There are many cyber threats, and it\u2019s very difficult to get a sense of the magnitude of them. Whether it\u2019s really to undermine your business or simply to use your IT resources for another purpose, your environment is constantly under attack. In order to protect your business from these hazards, it is first necessary to understand their sources. Then, familiarize yourself with the various tools available to you in order to enjoy a more secure computing environment.","og_url":"https:\/\/commtech.ca\/en\/cybersecurity\/","og_site_name":"Commtech","article_publisher":"https:\/\/www.facebook.com\/commtechinfo\/","article_published_time":"2022-04-05T04:31:18+00:00","article_modified_time":"2022-05-12T07:52:52+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg","type":"image\/jpeg"}],"author":"commtech","twitter_card":"summary_large_image","twitter_misc":{"Written by":"commtech"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/"},"author":{"name":"commtech","@id":"https:\/\/commtech.ca\/en\/#\/schema\/person\/8602ed63b4d24908d4bbcc3057f1f47e"},"headline":"Cybersecurity\u00a0","datePublished":"2022-04-05T04:31:18+00:00","dateModified":"2022-05-12T07:52:52+00:00","mainEntityOfPage":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/"},"wordCount":1,"commentCount":0,"publisher":{"@id":"https:\/\/commtech.ca\/en\/#organization"},"image":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg","keywords":["Security"],"articleSection":["Blog"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/commtech.ca\/en\/cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/commtech.ca\/en\/cybersecurity\/","url":"https:\/\/commtech.ca\/en\/cybersecurity\/","name":"Cybersecurity\u00a0 - Commtech","isPartOf":{"@id":"https:\/\/commtech.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg","datePublished":"2022-04-05T04:31:18+00:00","dateModified":"2022-05-12T07:52:52+00:00","breadcrumb":{"@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/commtech.ca\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#primaryimage","url":"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg","contentUrl":"https:\/\/commtech.ca\/wp-content\/uploads\/2022\/04\/pexels-christina-morillo-1181396.jpg","width":1280,"height":854},{"@type":"BreadcrumbList","@id":"https:\/\/commtech.ca\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/commtech.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/commtech.ca\/en\/#website","url":"https:\/\/commtech.ca\/en\/","name":"Commtech","description":"Informatique","publisher":{"@id":"https:\/\/commtech.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commtech.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/commtech.ca\/en\/#organization","name":"Commtech","url":"https:\/\/commtech.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/commtech.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.commtech.ca\/wp-content\/uploads\/2022\/04\/commtech_logo.png","contentUrl":"https:\/\/www.commtech.ca\/wp-content\/uploads\/2022\/04\/commtech_logo.png","width":1688,"height":352,"caption":"Commtech"},"image":{"@id":"https:\/\/commtech.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/commtechinfo\/","https:\/\/ca.linkedin.com\/company\/commtech-informatique\/"]},{"@type":"Person","@id":"https:\/\/commtech.ca\/en\/#\/schema\/person\/8602ed63b4d24908d4bbcc3057f1f47e","name":"commtech","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5fd6ceb87f54ee8d9ffa1bf30e706b463d211c8a1f338d53920d4304718a0a8a?s=96&d=mm&r=g","caption":"commtech"},"sameAs":["https:\/\/commtech.ca"]}]}},"builder_content":"<h2 id=\"block-65e95f05-9e5c-421c-9169-e01dd7073241\" tabindex=\"0\" role=\"document\" contenteditable=\"true\" aria-multiline=\"true\" aria-label=\"Bloc&amp;nbsp;: Titre\" data-block=\"65e95f05-9e5c-421c-9169-e01dd7073241\" data-type=\"core\/heading\" data-title=\"Titre\">Is your business at risk?<\/h2> <p>There are many cyber threats, and it\u2019s very difficult to get a sense of the magnitude of them. Whether it\u2019s really to undermine your business or simply to use your IT resources for another purpose, your environment is constantly under attack. In order to protect your business from these hazards, it is first necessary to understand their sources. Then, familiarize yourself with the various tools available to you in order to enjoy a more secure computing environment.<\/p>\n<h3>Different threats to watch.<\/h3> <p><\/p> <p>A computer can be contaminated in many ways. Spam is an unwanted email that usually contains advertising. However, some of these messages can pose a threat. Phishing is the act of deceiving the recipient by luring them to fake sites where their password and other confidential information will be retrieved. It is also possible to contaminate a company\u2019s computer equipment by downloading files or software updates from unprotected computers or websites, as well as from any unaudited external devices.<\/p> <p><\/p>\n<h3>The tools at your service.<\/h3> <p><\/p> <p>While no method is foolproof, there are many ways you can protect your company\u2019s IT environment. Install routers first, to better control the incoming and outgoing ports of your network, as well as firewalls, which will filter traffic and block some websites. Also provide your devices with antivirus software and your mail system with a spam filter. In addition, it is important to establish a security policy within your company. Make sure you manage access to your shared file directories and choose good passwords, ideally containing uppercase, lowercase, numbers and symbols.<br \/><\/p>\n<h3>It's better to be safe than sorry<\/h3> <p><\/p> <p>Equally important is the implementation of a recovery solution. In case of data loss, for example, make sure not only to back up all your essential data, but also to test the reliability of it. It is recommended to sync your data in the cloud, using a secure cloud service provider. Have a succession plan in place in the event of a disaster or loss of computer equipment. Creating a replica of your machines and servers, backed up on the cloud, helps avoid any loss of hardware-based data.<br \/><\/p>\n<p><\/p> <h3>Expert's advice<\/h3> <p><\/p> <p>According to Dominic Martine, co-owner of Commtech, it is essential to know the various threats that circulate, such as malware, phishing attempts and networks of zombie machines (computers infected, for malicious purposes, by a worm or a Trojan horse, which then attack other computers) and regularly update their knowledge as these threats evolve rapidly. To protect your IT environment, contact a specialized firm. They will test their safety, both from the outside and from the inside, then provide you with a safety audit and help you develop an action plan to prevent hazards.<br \/><\/p>","_links":{"self":[{"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/posts\/852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/comments?post=852"}],"version-history":[{"count":4,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/posts\/852\/revisions"}],"predecessor-version":[{"id":870,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/posts\/852\/revisions\/870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/media\/180"}],"wp:attachment":[{"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/media?parent=852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/categories?post=852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/commtech.ca\/en\/wp-json\/wp\/v2\/tags?post=852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}