Activité audio Cybersécurité

Activité audio réalisée dans le cadre de la formation du BTS SIO

J’ai produit un audio en anglais sur le sujet de la cybersécurité. Bonne écoute à vous !
Pierre-Alain Baqué

Texte support à la construction du discours.

Question 1 : Some managers may think «We’re just a small business, why would cyber criminals be interested in us? » Why should they be as concerned as bigger companies? What do you say to them ?
Answer 1 :
Even small businesses can be targets for cybercriminals. They don’t solely focus on large organizations and companies; what interests them is the data, whether it comes from a big or small company. Small businesses are often less protected and more vulnerable due to limited resources for their cyberdefense. Moreover, they can be targeted to access larger business partners. In short, every business needs to protect itself, regardless of size, because cybercriminals make no distinction.


Question 2 : Can you sum up the priorities that companies should have when it comes to cybersecurity?
Answer 2 :
Companies must establish several priorities in terms of cybersecurity to effectively protect themselves against threats. First, it is crucial to protect sensitive data using encryption systems and secure access. It is also important to perform regular backups of this data on multiple devices to ensure quick restoration in the event of an attack. Furthermore, regular software updates help to patch potential security vulnerabilities. Employee training is equally important: they should be made aware of best practices, including password management and recognizing phishing attempts. Finally, it is essential to have a contingency plan ready to deploy in the event of an attack, and to continuously monitor systems to detect any suspicious activity and respond quickly.


Question 3 : What are the most important aspects to consider? What pieces of advice would you give this manager?
Answer 3 :
The most important aspects to consider in terms of cybersecurity are the protection of sensitive data through encryption systems and secure access, as well as the regular backup of critical information on different devices to prevent any loss in the event of an attack. It is also essential to keep software up to date to fix security vulnerabilities, and to train employees in best practices, such as password management and recognizing phishing attempts. Finally, the company should have an incident response plan in place to react quickly in the event of a cyberattack. I would advise the manager to take a proactive approach by investing in robust security measures, regularly training staff, and continuously monitoring systems to detect any suspicious activity.

Retour en haut