Is it post-CoviD-19 computer security to consider a new crisis?
We do not yet know how long this crisis will last.
But what is certain is that it affects almost all sectors of activity. One of the most prominent sectors during this period is none other than Cybersecurity. It is clear that businesses and health structures as well as public bodies are suffering from another crisis, that of IT. And the question now is whether we are inevitably heading for another crisis. After coronavirus risks uncovering many of the loopholes that cybercriminals will not hesitate to exploit and we must prepare for them. "In fact, we are already exposed to cyberattacks.
This article will also interest you: Computer viruses behind the Covid-19 virus
We are every day" is what Simon Vieille, the director of information systems at Zenitude, a company that manages hotel residences all over France, highlighted. The risk is permanent. We remember that several health organizations were attacked in the midst of a pandemic. As such, cyber criminals do not have time with certain considerations. The intent to harm remains, apparently, still. Gilles Bousquet, a computer science teacher in the info-com department of UFR Lettres in Dijon, notes: "Even if both have the ability to reproduce, let's not forget that behind a computer virus, there is malice: an individual or group with the goal of harming, defrauding or revenge. ». This is the example of AP-HP which was one of the first establishments to suffer the lightning of cyber-prisoners in this period of health crisis. As the experts pointed out, the consequences of such an attack could have been worse. But fortunately for everyone, "The incident was handled quickly and efficiently by the AP-HP teams, with no critical impact. an official from the Information Systems Security Agency said.
In addition, Google reported earlier this month that nearly 18 million malicious emails, mostly for phishing, have been detected. They are all believed to be linked to the coronavirus pandemic. According to the AMERICAN giant, more than 240 million spams related to coronavirus were observed every day between 6 and 13 April.
On the business side, even though they are increasingly developing a department dedicated to cybersecurity, some problems remain. For some specialists, such as Alamin Mansouri, an academic, computer specialist and head of the network and telecommunications department at the IUT in Auxerre, they are nevertheless "partially unprepared". He points out that "cyberattacks are becoming more sophisticated and unforeseen. It is therefore necessary to think about security in the entire deployment of computer channels. We thought we'd delegated it to antiviral software and firewalls, but it's still not enough. ».With the health crisis, several loopholes were exposed. Indeed, it is no longer so easy to solve certain problems with a short time frame. Because physical intervention is more than necessary in some cases. With containment and telecommuting the norms of the moment, it's not easy "We didn't necessarily think of a Plan B plan that is telework," admits Alamin Mansouri.
"Computer security must become a priority," he added. If this expert advises the company to duplicate their servers, to ensure continuity in the event of an attack, he puts the issue of employee and employee training back on the table. "The biggest point of fragility is the users. Employees are trained to evacuate buildings in the event of a fire, but they are not trained in the event of a computer attack." Simon Vieille shared the opinion: "If the systems are more and more secure, it is the people who use these systems who are the first vectors of attacks (…) a company is being attacked less and less on its computer fleet. The first layer of attack is the person who consults his emails." It is for this reason that Alamin Mansouri calls for "demystifying it, so that users can also become actors and responsible for their uses. But let's keep in mind that there will always be flaws in the system. ».
Now access an unlimited number of passwords: