
{"id":28910,"date":"2025-11-13T15:57:54","date_gmt":"2025-11-13T14:57:54","guid":{"rendered":"https:\/\/hiptown.com\/it-security-best-practices-for-shared-workspaces\/"},"modified":"2025-11-24T16:30:57","modified_gmt":"2025-11-24T15:30:57","slug":"it-security-best-practices-for-shared-workspaces","status":"publish","type":"post","link":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/","title":{"rendered":"IT security: best practices for shared workspaces"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><\/p>\n<p>In a <strong>shared workspace<\/strong>, where digital exchanges are constant and equipment is often shared, <strong>IT security<\/strong> becomes an absolute priority. Whether it&#8217;s to preserve <strong>data confidentiality<\/strong>, avoid <strong>cyber-attacks<\/strong> or limit the risks associated with <strong>risky behavior<\/strong>, adopting <strong>best practices<\/strong> is essential.<\/p>\n<p><\/p>\n<p>Every user, whether employee, collaborator or freelancer, plays a key role in protecting sensitive systems and information. Simple gestures, such as rigorous <strong>password<\/strong> management, vigilance in the face of <strong>fraudulent messages<\/strong> or securing <strong>connected devices<\/strong>, can significantly strengthen day-to-day <strong>cybersecurity<\/strong>. In an environment where threats are constantly evolving, a proactive and collective approach is essential to guarantee a safe and reliable digital space.<\/p>\n<p><\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1344\" height=\"768\" class=\"lazyload wp-image-24389\" src=\"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1.png\" data-orig-src=\"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1.png\" alt=\"discover the best IT security practices to adopt in a shared workspace to protect your data and guarantee the confidentiality of your business information.\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271344%27%20height%3D%27768%27%20viewBox%3D%270%200%201344%20768%27%3E%3Crect%20width%3D%271344%27%20height%3D%27768%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-200x114.png 200w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-300x171.png 300w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-400x229.png 400w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-600x343.png 600w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-768x439.png 768w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-800x457.png 800w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-1024x585.png 1024w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1-1200x686.png 1200w, https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage-1.png 1344w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/figure>\n<p><\/p>\n<article>\n<p>In a <strong>coworking space<\/strong> or <strong>shared office<\/strong>, <strong>IT security<\/strong> becomes an absolute priority. With so many users, shared connections and shared equipment, the risks of <strong>cyber-attacks<\/strong>, <strong>data theft<\/strong> or<strong>malicious intrusion<\/strong> are heightened. Whether you&#8217;re <strong>self-employed<\/strong>, a <strong>start-up<\/strong> or a <strong>teleworker<\/strong>, adopting <strong>best practices<\/strong> will help protect your sensitive information while preserving your <strong>productivity<\/strong> and <strong>peace of mind<\/strong>. This article explores the essential measures for securing your digital tools, from <strong>password<\/strong> management to <strong>phishing<\/strong> prevention, to the safe use of <strong>shared networks<\/strong> and <strong>external devices<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Why IT security is crucial in shared spaces<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Collaborative workspaces<\/strong> offer unrivalled flexibility, but they also expose users to <strong>specific vulnerabilities<\/strong>. Unlike a traditional office, where access is often controlled by a dedicated infrastructure, a <strong>coworking<\/strong> or <strong>shared open space<\/strong> involves <strong>shared Wi-Fi connections<\/strong>, <strong>non-fixed workstations<\/strong> and <strong>frequent occupant rotation<\/strong>. These elements create a breeding ground for <strong>cyber threats<\/strong>, such as <strong>account hacking<\/strong>,<strong>data interception<\/strong> or<strong>malware infection<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>Furthermore, <strong>distractions<\/strong> and <strong>ambient noise<\/strong> &#8211; a well-known challenge in these environments, as <a href=\"https:\/\/hiptown.com\/en\/noise-at-work-its-impact-on-health-and-productivity\/bruit-au-travail-ses-impacts-sur-la-sante-et-la-productivite-3\/\" target=\"_blank\" rel=\"noopener\">this study on the impact of noise at work<\/a> highlights &#8211; can lead to <strong>carelessness<\/strong>: forgetting to lock your session, leaving a <strong>password<\/strong> lying around on a post-it note or plugging in an <strong>unfamiliar USB stick<\/strong>. A <strong>proactive security policy<\/strong> is therefore essential to limit these risks, especially as <strong>coworking<\/strong> spaces generally implement <strong>physical measures<\/strong> (cameras, badges) to complement digital protection, as detailed <a href=\"https:\/\/hiptown.com\/en\/faq-items\/are-your-premises-secure-what-is-the-coworking-spaces-security-policy-and-are-there-any-security-measures-in-place-such-as-security-cameras-or-access-keys\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Protecting your devices and data: the basics<\/h2>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Protecting your devices and data: the basics\n\nKeep your systems up to date\n\nThe first line of defense against cyberattacks is to regularly update your operating systems (Windows, macOS, Linux) and applications.\"><span class=\"Y2IQFc\" lang=\"en\">Keep your systems up to date<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>The first line of defense against <strong>cyberattacks<\/strong> is to <strong>regularly update<\/strong> your <strong>operating systems<\/strong> (Windows, macOS, Linux) and <strong>applications<\/strong>. Software publishers frequently release <strong>security patches<\/strong> to close the loopholes exploited by hackers. In <strong>shared-space<\/strong> environments, where networks are often shared, an unpatched vulnerability on your machine can be used as an entry point to compromise the entire network. Activate <strong>automatic updates<\/strong> and manually check at least once a month that everything is up to date.<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use a powerful antivirus and firewall\"><span class=\"Y2IQFc\" lang=\"en\">Use a powerful antivirus and firewall<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>An <strong>up-to-date antivirus<\/strong> is essential to detect and block <strong>malware<\/strong>, <strong>ransomware<\/strong> or <strong>spyware<\/strong> that could infect your device via an <strong>unsecured network<\/strong> or <strong>malicious attachment<\/strong>. Choose recognized solutions (Bitdefender, Kaspersky, Norton) and set up <strong>regular scans<\/strong>. Your system&#8217;s built-in <strong>firewall<\/strong> should also be activated to filter incoming and outgoing connections, especially if you use <strong>sensitive applications<\/strong> (accounting, project management).<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Secure your internet connection\"><span class=\"Y2IQFc\" lang=\"en\">Secure your internet connection<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>In a <strong>coworking<\/strong> space, <strong>shared Wi-Fi<\/strong> is a prime target for cybercriminals. To limit the risks, avoid open networks or those with suspicious names (e.g. &#8220;FreeWiFi_Hiptown_Fake&#8221;). Prefer connections requiring a <strong>password<\/strong> and, if possible, use a <strong>VPN (Virtual Private Network)<\/strong> to encrypt your traffic. A VPN creates a <strong>secure tunnel<\/strong> between your device and the Internet, making your data unreadable to anyone trying to intercept it. Solutions such as NordVPN and ProtonVPN offer both free and paid versions for professionals.<\/p>\n<p>&nbsp;<\/p>\n<p>To find out more about <strong>network security<\/strong> in shared spaces, visit <a href=\"https:\/\/hiptown.com\/en\/faq-items\/network-security-information\/\" target=\"_blank\" rel=\"noopener\">this dedicated page<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Password management: a pillar of security<\/h2>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Create strong, unique passwords\"><span class=\"Y2IQFc\" lang=\"en\">Create strong, unique passwords<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>A <strong>weak password<\/strong> is one of the main causes of <strong>account compromise<\/strong>. To be effective, a password must :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p>Be at least <strong>12 characters long<\/strong><span style=\"font-family: Consolas, Monaco, monospace;\">,<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Mix uppercase, lowercase, numbers and special characters (e.g. Afet@Zy6o45)\"><span class=\"Y2IQFc\" lang=\"en\">Mix <strong>uppercase, lowercase, numbers and special characters<\/strong> (e.g. Afet@Zy6o45)<\/span>,<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Be <strong>unrelated to your personal life<\/strong> (avoid names, dates of birth, or animal names),<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Be unique for each service (business messaging, social networks, online banking)\"><span class=\"Y2IQFc\" lang=\"en\">Be <strong>unique for each service<\/strong> (business messaging, social networks, online banking)<\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>To make memorization easier, use <strong>mnemonic methods<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Phonetic method: Transform a phrase into a password. For example, \u201cI bought eight CDs for a hundred euros this afternoon\u201d becomes ght8CD%E7am.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Phonetic method<\/strong>: Transform a phrase into a password. For example, \u201cI bought eight CDs for a hundred euros this afternoon\u201d becomes ght8CD%E7am.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: First letter method: Take the initials of a quote. \u201cOne of yours is better than two, you\u2019ll get it\u201d gives 1tvmQ2tl\u2019A.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>First letter method<\/strong>: Take the initials of a quote. \u201cOne of yours is better than two, you\u2019ll get it\u201d gives 1tvmQ2tl\u2019A.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Store and manage your passwords securely\"><span class=\"Y2IQFc\" lang=\"en\">Store and manage your passwords securely<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Writing your passwords on an <strong>unencrypted file<\/strong> or saving them in your browser without protection is a <strong>common mistake<\/strong>. For optimum management :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Never use the same password for multiple services.\n\n\n\n\nNever share it, even with a colleague or loved one.\n\n\n\n\nNever send it by email or messaging.\n\n\n\n\nRenew it regularly (every 3 to 6 months).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Never use the same password<\/strong> for multiple services.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Never use the same password for multiple services.\n\n\n\n\nNever share it, even with a colleague or loved one.\n\n\n\n\nNever send it by email or messaging.\n\n\n\n\nRenew it regularly (every 3 to 6 months).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Never share it<\/strong>, even with a colleague or loved one.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Never use the same password for multiple services.\n\n\n\n\nNever share it, even with a colleague or loved one.\n\n\n\n\nNever send it by email or messaging.\n\n\n\n\nRenew it regularly (every 3 to 6 months).\"><strong><span class=\"Y2IQFc\" lang=\"en\">Never send it by email or messaging.<\/span><\/strong><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Never use the same password for multiple services.\n\n\n\n\nNever share it, even with a colleague or loved one.\n\n\n\n\nNever send it by email or messaging.\n\n\n\n\nRenew it regularly (every 3 to 6 months).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Renew it regularly<\/strong> (every 3 to 6 months).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use a password manager like KeePass, an open-source and secure solution, pre-installed on Windows 10 workstations in many coworking spaces. Beware of fraudulent versions: download it only from the official website.\"><strong><span class=\"Y2IQFc\" lang=\"en\">U<\/span><\/strong><span class=\"Y2IQFc\" lang=\"en\"><strong>se a password manager<\/strong> like KeePass, an open-source and secure solution, pre-installed on Windows 10 workstations in many coworking spaces. Beware of fraudulent versions: download it only from <a href=\"https:\/\/keepass.info\/\">the official website<\/a>.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>To find out more, take a look at the <strong>simple steps you can take<\/strong> to strengthen your day-to-day cybersecurity on <a href=\"https:\/\/hiptown.com\/en\/la-cybersecurite-actions-simples-a-entreprendre-a-notre-echelle\/\" target=\"_blank\" rel=\"noopener\">this page<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Protect yourself against phishing and social engineering attacks<\/h2>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Recognize a fraudulent email or message\"><span class=\"Y2IQFc\" lang=\"en\">Recognize a fraudulent email or message<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><strong>Phishing<\/strong> is a common technique for stealing credentials or installing <strong>malware<\/strong>. Telltale signs include:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Broken French or unusual expressions.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Broken English<\/strong> or unusual expressions.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: A suspicious emergency (\u201cYour account will be suspended in 24 hours!\u201d).\"><span class=\"Y2IQFc\" lang=\"en\">A <strong>suspicious emergency<\/strong> (\u201cYour account will be suspended in 24 hours!\u201d).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: A generic signature (\u201cThe support team\u201d) or a questionable email address (e.g.: support@amazon-secure.com instead of support@amazon.fr).\"><span class=\"Y2IQFc\" lang=\"en\">A <strong>generic signature<\/strong> (\u201cThe support team\u201d) or a questionable email address (e.g.: support@amazon-secure.com instead of support@amazon.fr).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Unexpected links or attachments.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Unexpected links<\/strong> or attachments.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>To check a link, hover your mouse over it (without clicking) to display the actual URL. If in doubt, contact the sender via another channel (telephone, official message).<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: What to do if you are a victim of phishing?\"><span class=\"Y2IQFc\" lang=\"en\">What to do if you are a victim of phishing?<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>If you have clicked on a link or provided sensitive information :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Don't panic: cybercriminals exploit shame to dissuade victims from taking action.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Don&#8217;t panic<\/strong>: cybercriminals exploit shame to dissuade victims from taking action.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Change compromised passwords immediately.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Change compromised<\/strong> passwords immediately.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Report the incident to the DSI (Information Systems Department) of your coworking space or to your IT department.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Report the incident<\/strong> to the DSI (Information Systems Department) of your coworking space or to your IT department.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Monitor your accounts for suspicious activity.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Monitor your accounts<\/strong> for suspicious activity.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Attacks are becoming increasingly sophisticated, perfectly imitating legitimate communications. <strong>Constant vigilance<\/strong> is therefore essential.<\/p>\n<p>&nbsp;<\/p>\n<h2>Securing your peripherals and work sessions<\/h2>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: The risks associated with USB keys and external disks\"><span class=\"Y2IQFc\" lang=\"en\">The risks associated with USB keys and external disks<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><strong>USB devices<\/strong> can carry <strong>viruses<\/strong> or <strong>Trojan<\/strong> horses. In a <strong>shared space<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use personal USB keys dedicated to professional use.\"><span class=\"Y2IQFc\" lang=\"en\">Only use <strong>personal USB<\/strong> keys dedicated to professional use.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disable automatic execution of files when plugging.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Disable automatic execution<\/strong> of files when plugging.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Always scan the device with your antivirus before opening a file.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Always scan the device<\/strong> with your antivirus before opening a file.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Avoid public charging stations: some can extract data via the USB cable (&quot;juice jacking&quot;).\"><span class=\"Y2IQFc\" lang=\"en\">Avoid <strong>public charging stations<\/strong>: some can extract data via the USB cable (<strong>&#8220;juice jacking&#8221;<\/strong>).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Lock your session and protect your computer\"><span class=\"Y2IQFc\" lang=\"en\">Lock your session and protect your computer<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>An unlocked <strong>session<\/strong> is an invitation to <strong>spying<\/strong> or <strong>data theft<\/strong>. Adopt these reflexes:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Lock your screen whenever you are away, even for a few minutes. Use keyboard shortcuts\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Lock your screen<\/strong> whenever you are away, even for a few minutes. Use keyboard shortcuts<\/span>:<span style=\"font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p><strong>Windows<\/strong> : Windows key + L,<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Mac<\/strong> : Ctrl + Shift + Power,<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Linux (Gnome)<\/strong> : Ctrl + Alt + L.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Turn off or put your computer to sleep at the end of the day.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Turn off or put your computer<\/strong> to sleep at the end of the day.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Don't leave sensitive documents lying around on your desk.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Don&#8217;t leave sensitive documents<\/strong> lying around on your desk.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>These simple gestures considerably reduce the risk of <strong>unauthorized access<\/strong> to your data.<\/p>\n<p>&nbsp;<\/p>\n<h2>Back up your data and learn best practices<\/h2>\n<p>&nbsp;<\/p>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: The importance of regular backups\"><span class=\"Y2IQFc\" lang=\"en\">The importance of regular backups<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>A <strong>hardware failure<\/strong>, <strong>accidental deletion<\/strong> or <strong>cyber attack<\/strong> (such as ransomware) can wipe out your data in seconds. To avoid irrecoverable loss :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Make automatic backups to an external hard drive or secure cloud service (Google Drive, Dropbox, Nextcloud).\"><span class=\"Y2IQFc\" lang=\"en\">Make <strong>automatic backups<\/strong> to an <strong>external hard drive<\/strong> or <strong>secure cloud service<\/strong> (Google Drive, Dropbox, Nextcloud).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Apply the 3-2-1 rule\"><strong><span class=\"Y2IQFc\" lang=\"en\">Apply the 3-2-1 rule<\/span><\/strong>:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: 3 copies of your data\"><span class=\"Y2IQFc\" lang=\"en\">3 copies of your data<\/span>,<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: 2 different supports\"><span class=\"Y2IQFc\" lang=\"en\">2 different supports<\/span>,<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: 1 off-site backup (e.g. cloud).\"><span class=\"Y2IQFc\" lang=\"en\">1 off-site backup (e.g. cloud).<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<div id=\"tw-container\" class=\"nev7se\" data-cp=\"1\" data-nnttsvi=\"1\" data-sletp=\"false\" data-sm=\"1\" data-ssbp=\"false\" data-sugg-time=\"500\" data-sugg-url=\"https:\/\/clients1.google.com\/complete\/search\" data-uilc=\"fr\" data-vil=\",af,af-ZA,am,am-ET,ar-EG,ar-AE,ar-KW,ar-QA,ar,ar-IL,ar-JO,ar-LB,ar-PS,az,az-AZ,bg,bg-BG,bn,bn-BD,bn-IN,ca,ca-es,cs,cs-CZ,de,de-DE,de-CH,de-AT,de-LI,en,en-US,en-CA,en-AU,en-NZ,en-GB,en-IN,en-KE,en-TZ,en-NG,en-GH,en-PH,en-ZA,es,es-ES,es-AR,es-UY,es-419,es-BO,es-CL,es-CR,es-CO,es-DO,es-EC,es-GT,es-HN,es-NI,es-PA,es-PE,es-PR,es-PY,es-SV,es-VE,es-MX,es-US,eu,eu-ES,fi,fi-FI,fr,fr-FR,fr-CH,fr-BE,gl,gl-ES,gu,gu-IN,he,he-IL,iw,iw-IL,hu,hu-HU,hy,hy-AM,id,id-ID,is,is-IS,it,it-IT,it-CH,ja,ja-JP,jv,jv-ID,ka,ka-GE,km,km-KH,kn,kn-IN,ko,ko-KR,la,lo,lo-LA,lv,lv-LV,ml,ml-IN,mr,mr-IN,ms,ms-MY,nl,nl-NL,nb,nb-NO,ne,ne-NP,pl,pl-PL,pt,pt-BR,pt-PT,ro,ro-RO,ru,ru-RU,si-LK,sk,sk-SK,sr,sr-RS,su,su-ID,sv,sv-SE,sw,sw-TZ,sw-KE,ta,ta-IN,ta-SG,ta-LK,ta-MY,te,te-IN,tr,tr-TR,ur,ur-PK,ur-IN,yue,yue-HK,yue-Hant-HK,zh-HK,zh,zh-CN,zh-cmn,zh-cmn-CN,zh-Hans,zh-Hans-CN,zh-cmn-Hans,zh-cmn-Hans-CN,cmn-CN,cmn-Hans,cmn-Hans-CN,zh-TW,zh-Hant-TW,cmn-TW,cmn-Hant-TW,zh-cmn-TW,zh-cmn-Hant-TW,zu,zu-ZA,hi,hi-IN,tl,tl-PH,pa,pa-IN\">\n<div>\n<div>\n<div id=\"tw-ob\" class=\"tw-src-ltr\">\n<div class=\"oSioSc\">\n<div id=\"tw-target\">\n<div id=\"kAz1tf\" class=\"g9WsWb PZPZlf\" data-attrid=\"tw-targetArea\" data-entityname=\"Google Translate\">\n<div id=\"tw-target-text-container\" class=\"tw-ta-container tw-nfl\" tabindex=\"0\" role=\"text\">\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Regularly test the restoration of your backups.\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Regularly test<\/strong> the restoration of your backups.<\/span><\/p>\n<\/div>\n<div id=\"tw-target-rmn-container\" class=\"tw-target-rmn tw-ta-container tw-nfl\" tabindex=\"-1\" role=\"text\">\n<pre id=\"tw-target-rmn\" class=\"tw-data-placeholder tw-text-small tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"\">\u00a0<\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Train yourself and stay informed\"><span class=\"Y2IQFc\" lang=\"en\">Train yourself and stay informed<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><strong>Cybersecurity<\/strong> is constantly evolving, and keeping up to date is essential. The <strong>ANSSI<\/strong> (<span class=\"Y2IQFc\" lang=\"en\">National Agency for Information Systems Security<\/span>) offers accessible resources:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>The <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2017\/01\/guide_cpme_bonnes_pratiques.pdf\">best practices guide<\/a> for professionals.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>The <a href=\"https:\/\/secnumacademie.gouv.fr\/\">SecNum Academy<\/a>, a free MOOC to understand the challenges of digital security.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>In addition, <strong>workshops or webinars<\/strong> are often organized in coworking spaces to raise members&#8217; awareness of <strong>new threats<\/strong> and <strong>appropriate solutions<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Creating a safe and pleasant working environment<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>IT security<\/strong> isn&#8217;t just about digital tools. A <strong>well-designed work environment<\/strong> also helps reduce risks. For example, the addition of <strong>plants to the office<\/strong> can improve your <strong>well-being<\/strong> and <strong>concentration<\/strong>, limiting errors due to fatigue or stress. Find out how to optimize your space on <a href=\"https:\/\/hiptown.com\/en\/les-plantes-au-bureau-pour-ameliorer-votre-bien-etre-au-travail-3\/\" target=\"_blank\" rel=\"noopener\">this page<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Finally, don&#8217;t forget that <strong>security is everyone&#8217;s business<\/strong>. By adopting these <strong>best practices<\/strong> and remaining vigilant, you protect not only your data, but also that of your colleagues and your company.<\/p>\n<p>&nbsp;<\/p>\n<\/article>\n<h1>IT security in shared workspaces: FAQ<\/h1>\n<div class=\"faq-section\">\n<h2>\ud83d\udd12 Why is IT security crucial in a shared workspace?<\/h2>\n<p>&nbsp;<\/p>\n<p>In a <strong>shared business environment<\/strong>, the risks of <strong>cyber-attacks<\/strong>, <strong>data leaks<\/strong> or unauthorized access to sensitive information are multiplied. Multiple users connect to the same networks, use common equipment or share files, increasing vulnerabilities. A security breach can impact not only your personal data, but also that of your colleagues or your company, with potential consequences for <strong>reputation<\/strong>, <strong>productivity<\/strong> and even <strong>legality<\/strong> (RGPD, industrial secrets).<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"faq-section\">\n<h2>\ud83d\udda5\ufe0f What are the first steps you should take to secure your workstation in a shared workspace?<\/h2>\n<p>&nbsp;<\/p>\n<p>Here are the <strong>priority actions<\/strong> to be implemented:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Mettre \u00e0 jour r\u00e9guli\u00e8rement<\/strong> le <strong>syst\u00e8me d\u2019exploitation<\/strong> (Windows, macOS, Linux) et les <strong>applications<\/strong> pour corriger les failles de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Installer et maintenir \u00e0 jour un <strong>antivirus performant<\/strong> (ex : Windows Defender, Bitdefender, Kaspersky).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Utiliser un <strong>compte utilisateur standard<\/strong> (\u00e9viter les droits administrateur) pour limiter les d\u00e9g\u00e2ts en cas d\u2019infection.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Verrouiller syst\u00e9matiquement votre session<\/strong> d\u00e8s que vous quittez votre poste (raccourci <strong>Windows + L<\/strong> ou <strong>Ctrl + Shift + Power<\/strong> sur Mac).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>D\u00e9sactiver les options de <strong>connexion automatique<\/strong> (Wi-Fi, sessions) pour \u00e9viter les acc\u00e8s non autoris\u00e9s.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"faq-section\">\n<h2>\ud83d\udd11 How do you create a strong, easy-to-remember password for a shared space?<\/h2>\n<p>&nbsp;<\/p>\n<p>A <strong>secure password<\/strong> must be :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Compos\u00e9 d\u2019au moins <strong>12 caract\u00e8res<\/strong>, avec des <strong>majuscules<\/strong>, <strong>minuscules<\/strong>, <strong>chiffres<\/strong> et <strong>caract\u00e8res sp\u00e9ciaux<\/strong> (ex : <code>Afet@Zy6o45!<\/code>).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Unique pour chaque service<\/strong> (messagerie professionnelle, outils collaboratifs, r\u00e9seaux sociaux).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Sans lien avec votre vie personnelle (\u00e9viter noms, dates de naissance, pr\u00e9noms d\u2019enfants ou d\u2019animaux).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>To remember it easily, use <strong>mnemonic methods<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>M\u00e9thode phon\u00e9tique<\/strong> : Transformez une phrase en mot de passe (ex : *\u00ab J\u2019ai achet\u00e9 8 CDs pour 100 euros \u00bb* \u2192 <code>ght8CD%100e<\/code>).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>M\u00e9thode des premi\u00e8res lettres<\/strong> : Prenez les initiales d\u2019une citation (ex : *\u00ab Un tien vaut mieux que deux tu l\u2019auras \u00bb* \u2192 <code>1tvmQ2tl\u2019A<\/code>).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Do not<\/strong> use:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Stocker vos mots de passe dans un fichier non s\u00e9curis\u00e9 (Excel, bloc-notes).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Les partager avec des coll\u00e8gues ou des tiers, m\u00eame temporairement.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Les envoyer par email ou messagerie instantan\u00e9e.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"faq-section\">\n<h2>\ud83d\udd04 Why and how should you renew your passwords regularly?<\/h2>\n<p>&nbsp;<\/p>\n<p>Renewing your passwords every <strong>3 to 6 months<\/strong> reduces the risk of them being stolen or leaked (e.g. after a cyber-attack on a third-party service). Here&#8217;s how:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Utilisez un <strong>gestionnaire de mots de passe<\/strong> comme <strong>KeePass<\/strong> pour g\u00e9n\u00e9rer et stocker des mots de passe complexes.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Activez la <strong>double authentification (2FA)<\/strong> lorsque c\u2019est possible (SMS, application comme Google Authenticator).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Priorisez les comptes sensibles (emails professionnels, outils m\u00e9tiers, acc\u00e8s administrateurs).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Tip<\/strong>: Set reminders in your calendar to schedule these updates.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"faq-section\">\n<h2>\ud83d\udce7 How to recognize a phishing email in a shared space?<\/h2>\n<p>&nbsp;<\/p>\n<p>Phishing <strong>attacks<\/strong> are common in shared environments. Here are the <strong>telltale signs<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Exp\u00e9diteur suspect<\/strong> : V\u00e9rifiez l\u2019adresse email (ex : <code>support@amazon-security.com<\/code> au lieu de <code>support@amazon.fr<\/code>). Passez la souris sur l\u2019exp\u00e9diteur sans cliquer.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Fautes d\u2019orthographe ou de grammaire<\/strong> : Les messages l\u00e9gitimes sont g\u00e9n\u00e9ralement bien r\u00e9dig\u00e9s.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Urgence ou menace<\/strong> : *\u00ab Votre compte sera suspendu dans 24h \u00bb* ou *\u00ab Action requise imm\u00e9diatement \u00bb*.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Liens ou pi\u00e8ces jointes douteux<\/strong> : Survolez les liens pour voir l\u2019URL r\u00e9elle (ex : un lien affichant \u00ab Google Drive \u00bb mais pointant vers une URL inconnue).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Demande d\u2019informations sensibles<\/strong> : Aucun service s\u00e9rieux (DSI, banque, administration) ne demande votre mot de passe par email.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What to do if in doubt?<\/strong> Contact your <strong>IT department<\/strong> before clicking or replying.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"faq-section\">\n<h2>\ud83d\udea8 What should I do if I&#8217;ve clicked on a link or opened a suspicious attachment?<\/h2>\n<p>&nbsp;<\/p>\n<p>Act quickly to limit the damage:<\/p>\n<ol>\n<li id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">Report the incident to the IT department or security manager immediately. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">Do not share any other usernames and immediately change the passwords of potentially compromised accounts. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">Run a full antivirus scan of your machine.<\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Disconnect your device from the network (Wi-Fi, Ethernet) to prevent the spread of possible malware.\n\n\n\n\nReport the incident to the IT department or security manager immediately. Don\u2019t hide the mistake: cyberattacks are becoming more and more sophisticated.\n\n\n\n\nDo not share any other usernames and immediately change the passwords of potentially compromised accounts.\n\n\n\n\nRun a full antivirus scan of your machine.\"><span class=\"Y2IQFc\" lang=\"en\">If you entered credentials on a fraudulent site, enable two-factor authentication on the affected accounts.<\/span><\/li>\n<li style=\"list-style-type: none;\">\u00a0<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Worth knowing<\/strong>: The consequences can range from data theft to <strong>infection of the entire<\/strong> corporate <strong>network<\/strong>. Rapid reaction is crucial.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"faq-section\">\n<h2>\ud83d\udcbe Why and how to make regular backups in a shared space?<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Backups<\/strong> protect against :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Ransomware (ransomware that encrypts your files).\n\n\n\n\nAccidental deletions or human errors.\n\n\n\n\nHardware failures (hard drive, server).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Ransomware<\/strong> (ransomware that encrypts your files).<\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Ransomware (ransomware that encrypts your files).\n\n\n\n\nAccidental deletions or human errors.\n\n\n\n\nHardware failures (hard drive, server).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Accidental deletions or human errors<\/strong>. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Ransomware (ransomware that encrypts your files).\n\n\n\n\nAccidental deletions or human errors.\n\n\n\n\nHardware failures (hard drive, server).\"><span class=\"Y2IQFc\" lang=\"en\"><strong>Hardware failures<\/strong> (hard drive, server).<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Best practices<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use the 3-2-1 rule:\n3 copies of your data,\n\n\n\n\non 2 different supports,\n\n\n\n\nincluding 1 off-site (secure cloud or external hard drive stored in a safe place).\"><span class=\"Y2IQFc\" lang=\"en\">Use the 3-2-1 rule: 3 copies of your data, on 2 different supports, including 1 off-site (secure cloud or external hard drive stored in a safe place).<\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use the 3-2-1 rule:\n3 copies of your data,\n\n\n\n\non 2 different supports,\n\n\n\n\nincluding 1 off-site (secure cloud or external hard drive stored in a safe place).\">Automate backups via tools like Veeam, Acronis or integrated solutions (Time Machine for Mac, File History for Windows).<\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use the 3-2-1 rule:\n3 copies of your data,\n\n\n\n\non 2 different supports,\n\n\n\n\nincluding 1 off-site (secure cloud or external hard drive stored in a safe place).\">Regularly test the restoration of backups to ensure their integrity.<\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use the 3-2-1 rule:\n3 copies of your data,\n\n\n\n\non 2 different supports,\n\n\n\n\nincluding 1 off-site (secure cloud or external hard drive stored in a safe place).\">For sensitive files, use encrypted solutions (e.g. VeraCrypt).<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<p><\/p>\n<div class=\"faq-section\">\n<p>&nbsp;<\/p>\n<h2>\ud83d\udd0c What are the risks associated with USB devices in shared space?<\/h2>\n<p>&nbsp;<\/p>\n<p>USB sticks or external hard drives can be vectors of :<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Malware (viruses, Trojan horses) spreading automatically upon connection.\n\n\n\n\nData leaks if the device is lost or stolen.\n\n\n\n\nUnauthorized access to sensitive files if the device is not encrypted.\"><span class=\"Y2IQFc\" lang=\"en\">Malware (viruses, Trojan horses) spreading automatically upon connection. <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Malware (viruses, Trojan horses) spreading automatically upon connection.\n\n\n\n\nData leaks if the device is lost or stolen.\n\n\n\n\nUnauthorized access to sensitive files if the device is not encrypted.\"><span class=\"Y2IQFc\" lang=\"en\">Data leaks if the device is lost or stolen. <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Malware (viruses, Trojan horses) spreading automatically upon connection.\n\n\n\n\nData leaks if the device is lost or stolen.\n\n\n\n\nUnauthorized access to sensitive files if the device is not encrypted.\"><span class=\"Y2IQFc\" lang=\"en\">Unauthorized access to sensitive files if the device is not encrypted.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Precautions to be taken<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use peripherals approved by the DSI and dedicated to professional use.\n\n\n\n\nDisable AutoRun in Windows Security settings.\n\n\n\n\nSystematically scan the device with an antivirus before opening.\n\n\n\n\nEncrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac).\n\n\n\n\nAvoid plugging personal or unknown devices into workstations.\"><span class=\"Y2IQFc\" lang=\"en\">Only use peripherals approved by the DSI and dedicated to professional use.<\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use peripherals approved by the DSI and dedicated to professional use.\n\n\n\n\nDisable AutoRun in Windows Security settings.\n\n\n\n\nSystematically scan the device with an antivirus before opening.\n\n\n\n\nEncrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac).\n\n\n\n\nAvoid plugging personal or unknown devices into workstations.\"><span class=\"Y2IQFc\" lang=\"en\">Disable AutoRun in Windows Security settings. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use peripherals approved by the DSI and dedicated to professional use.\n\n\n\n\nDisable AutoRun in Windows Security settings.\n\n\n\n\nSystematically scan the device with an antivirus before opening.\n\n\n\n\nEncrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac).\n\n\n\n\nAvoid plugging personal or unknown devices into workstations.\"><span class=\"Y2IQFc\" lang=\"en\">Systematically scan the device with an antivirus before opening. <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use peripherals approved by the DSI and dedicated to professional use.\n\n\n\n\nDisable AutoRun in Windows Security settings.\n\n\n\n\nSystematically scan the device with an antivirus before opening.\n\n\n\n\nEncrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac).\n\n\n\n\nAvoid plugging personal or unknown devices into workstations.\"><span class=\"Y2IQFc\" lang=\"en\">Encrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac). <\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Only use peripherals approved by the DSI and dedicated to professional use.\n\n\n\n\nDisable AutoRun in Windows Security settings.\n\n\n\n\nSystematically scan the device with an antivirus before opening.\n\n\n\n\nEncrypt sensitive data with tools like BitLocker (Windows) or FileVault (Mac).\n\n\n\n\nAvoid plugging personal or unknown devices into workstations.\"><span class=\"Y2IQFc\" lang=\"en\">Avoid plugging personal or unknown devices into workstations.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"faq-section\">\n<h2>\ud83c\udf10 How to secure web browsing in a shared workspace?<\/h2>\n<p>&nbsp;<\/p>\n<p>Here&#8217;s what <strong>you need to do<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches. <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">Enable private browsing for sensitive sessions (avoid storing cookies and logs). <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">I<\/span><span class=\"Y2IQFc\" lang=\"en\">nstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption). <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">Check that the sites visited use the HTTPS protocol (padlock in the URL bar). <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">Do not store passwords in the browser. Prefer a dedicated manager like KeePass. <\/span><\/p>\n<\/li>\n<li>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" tabindex=\"-1\" role=\"text\" data-placeholder=\"Traduction\" data-ved=\"2ahUKEwiM7sW8gouRAxVxRKQEHUBPGmUQ3ewLegQICxAV\" aria-label=\"Texte traduit\u00a0: Use an up-to-date browser (Chrome, Firefox, Edge) with the latest security patches.\n\n\n\n\nEnable private browsing for sensitive sessions (avoid storing cookies and logs).\n\n\n\n\nInstall security extensions like uBlock Origin (malicious ad blocker) or HTTPS Everywhere (forces encryption).\n\n\n\n\nCheck that the sites visited use the HTTPS protocol (padlock in the URL bar).\n\n\n\n\nDo not store passwords in the browser. Prefer a dedicated manager like KeePass.\n\n\n\n\nSystematically log out of sensitive accounts (bank, business tools) after use.\"><span class=\"Y2IQFc\" lang=\"en\">Systematically log out of sensitive accounts (bank, business tools) after use.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<p><\/p>\n<div class=\"faq-section\">\n<p>&nbsp;<\/p>\n<h2>\ud83d\udcf1 What precautions should be taken with mobile devices (smartphones, tablets) in shared spaces?<\/h2>\n<p>&nbsp;<\/p>\n<p>Mobile devices are often overlooked, yet they access the same networks and data. Here&#8217;s how to secure them:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p>Enable code\/PIN\/biometrics lock (fingerprint, facial recognition).<\/p>\n<\/li>\n<li>\n<p>Encrypt device storage (security settings).<\/p>\n<\/li>\n<li>\n<p>Avoid connecting to unsecured public Wi-Fi networks. Use a VPN if necessary.<\/p>\n<\/li>\n<li>\n<p>Turn off Bluetooth and Wi-Fi when not in use.<\/p>\n<\/li>\n<li>\n<p>Only download applications from official stores (App Store, Google Play).<\/p>\n<\/li>\n<li>\n<p>Use MDM (Mobile Device Management) solutions if your company offers one.<\/p>\n<\/li>\n<li>\n<p>Erase data remotely in case of loss or theft (\u201cFind my device\u201d feature).<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"faq-section\">\n<h2>\ud83d\udd27 Why use a shared-space password manager like KeePass?<\/h2>\n<p>&nbsp;<\/p>\n<p>A <strong>password manager<\/strong> like KeePass offers several advantages:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p>Secure centralization: All your passwords are stored in an encrypted database, protected by a master password.<\/p>\n<\/li>\n<li>\n<p>Complex password generation: The tool creates unique and strong passwords for each service.<\/p>\n<\/li>\n<li>\n<p>Phishing protection: KeePass does not automatically fill fields on fraudulent sites.<\/p>\n<\/li>\n<li>\n<p>Controlled sharing: In a shared space, you can share passwords securely (via a common KeePass file, protected by a strong password).<\/p>\n<\/li>\n<li>\n<p>Portability: The database can be stored on an encrypted USB drive or secure cloud.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Precautions with KeePass<\/strong>:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p>Download it only from the official website (beware of fraudulent versions).<\/p>\n<\/li>\n<li>\n<p>Choose a very strong master password (it&#8217;s the only key to accessing all your other passwords).<\/p>\n<\/li>\n<li>\n<p>Back up the database regularly and test its restoration.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"faq-section\">\n<h2>\ud83d\udd04 How can you make your colleagues aware of good safety practices in shared spaces?<\/h2>\n<p>&nbsp;<\/p>\n<p>IT security is a <strong>collective responsibility<\/strong>. Here&#8217;s how to get your team involved:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\n<p>Organize workshops: Present the risks (phishing, ransomware) and barrier gestures via concrete examples.<\/p>\n<\/li>\n<li>\n<p>Share resources: Disseminate guides like that of ANSSI or infographics on good practices.<\/p>\n<\/li>\n<li>\n<p>Simulate attacks: With the agreement of the IT department, send phishing test emails to assess the team\u2019s vigilance.<\/p>\n<\/li>\n<li>\n<p>Create a dedicated channel (Slack, Teams) to report fraud attempts or ask questions.<\/p>\n<\/li>\n<li>\n<p>Encourage feedback: If a colleague has been the victim of an attempted scam, share the incident (without judgment) to learn from it.<\/p>\n<\/li>\n<li>\n<p>Regular reminder: Integrate safety reminders into internal meetings or newsletters.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Key message<\/strong>: &#8220;Safety is like a vaccine: it only works if everyone participates.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":28911,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[483],"tags":[],"class_list":["post-28910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coworking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: Protecting your coworking data<\/title>\n<meta name=\"description\" content=\"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: Protecting your coworking data\" \/>\n<meta property=\"og:description\" content=\"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/\" \/>\n<meta property=\"og:site_name\" content=\"Hiptown Bureaux \u00e0 Louer\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hiptownlovesyou\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T14:57:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T15:30:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ludovic C\u00e9l\u00e9rier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hiptownlovesyou\" \/>\n<meta name=\"twitter:site\" content=\"@hiptownlovesyou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ludovic C\u00e9l\u00e9rier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/\"},\"author\":{\"name\":\"Ludovic C\u00e9l\u00e9rier\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#\\\/schema\\\/person\\\/f303ab8dda6ce73445aaf54fc71d54bb\"},\"headline\":\"IT security: best practices for shared workspaces\",\"datePublished\":\"2025-11-13T14:57:54+00:00\",\"dateModified\":\"2025-11-24T15:30:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/\"},\"wordCount\":3172,\"publisher\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/09\\\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png\",\"articleSection\":[\"Coworking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/\",\"url\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/\",\"name\":\"Cybersecurity: Protecting your coworking data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/09\\\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png\",\"datePublished\":\"2025-11-13T14:57:54+00:00\",\"dateModified\":\"2025-11-24T15:30:57+00:00\",\"description\":\"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/09\\\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png\",\"contentUrl\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/09\\\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png\",\"width\":1344,\"height\":768,\"caption\":\"discover the best IT security practices to adopt in a shared workspace to protect your data and avoid cyberthreats in the office.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/it-security-best-practices-for-shared-workspaces\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hiptown.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General\",\"item\":\"https:\\\/\\\/hiptown.com\\\/en\\\/category\\\/general\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Coworking\",\"item\":\"https:\\\/\\\/hiptown.com\\\/en\\\/category\\\/general\\\/coworking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IT security: best practices for shared workspaces\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hiptown.com\\\/en\\\/\",\"name\":\"Hiptown Coworking et bureau flexibles et op\u00e9r\u00e9\",\"description\":\"Coworking, Bureaux flexibles et op\u00e9r\u00e9s cl\u00e9 en main. Partout en France.\",\"publisher\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#organization\"},\"alternateName\":\"Hiptown bureaux \u00e0 louer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hiptown.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#organization\",\"name\":\"Hiptown Coworking et bureau \u00e0 louer ou op\u00e9r\u00e9\",\"alternateName\":\"Hiptown bureaux \u00e0 louer\",\"url\":\"https:\\\/\\\/hiptown.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/07\\\/hiptown_logo-xs.svg\",\"contentUrl\":\"https:\\\/\\\/hiptown.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2022\\\/07\\\/hiptown_logo-xs.svg\",\"width\":98,\"height\":75,\"caption\":\"Hiptown Coworking et bureau \u00e0 louer ou op\u00e9r\u00e9\"},\"image\":{\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hiptownlovesyou\\\/\",\"https:\\\/\\\/x.com\\\/hiptownlovesyou\",\"https:\\\/\\\/www.instagram.com\\\/hiptownlovesyou\\\/\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/hiptown\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCNtbRT8HkE3s0F0AMaxX9VQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hiptown.com\\\/en\\\/#\\\/schema\\\/person\\\/f303ab8dda6ce73445aaf54fc71d54bb\",\"name\":\"Ludovic C\u00e9l\u00e9rier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g\",\"caption\":\"Ludovic C\u00e9l\u00e9rier\"},\"description\":\"Fondateur de Hiptown\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: Protecting your coworking data","description":"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: Protecting your coworking data","og_description":"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.","og_url":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/","og_site_name":"Hiptown Bureaux \u00e0 Louer","article_publisher":"https:\/\/www.facebook.com\/hiptownlovesyou\/","article_published_time":"2025-11-13T14:57:54+00:00","article_modified_time":"2025-11-24T15:30:57+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png","type":"image\/png"}],"author":"Ludovic C\u00e9l\u00e9rier","twitter_card":"summary_large_image","twitter_creator":"@hiptownlovesyou","twitter_site":"@hiptownlovesyou","twitter_misc":{"Written by":"Ludovic C\u00e9l\u00e9rier","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#article","isPartOf":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/"},"author":{"name":"Ludovic C\u00e9l\u00e9rier","@id":"https:\/\/hiptown.com\/en\/#\/schema\/person\/f303ab8dda6ce73445aaf54fc71d54bb"},"headline":"IT security: best practices for shared workspaces","datePublished":"2025-11-13T14:57:54+00:00","dateModified":"2025-11-24T15:30:57+00:00","mainEntityOfPage":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/"},"wordCount":3172,"publisher":{"@id":"https:\/\/hiptown.com\/en\/#organization"},"image":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#primaryimage"},"thumbnailUrl":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png","articleSection":["Coworking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/","url":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/","name":"Cybersecurity: Protecting your coworking data","isPartOf":{"@id":"https:\/\/hiptown.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#primaryimage"},"image":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#primaryimage"},"thumbnailUrl":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png","datePublished":"2025-11-13T14:57:54+00:00","dateModified":"2025-11-24T15:30:57+00:00","description":"Discover the best IT security practices to adopt in shared workspaces to protect your data on a daily basis.","breadcrumb":{"@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#primaryimage","url":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png","contentUrl":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2025\/09\/Securite-informatique-les-bonnes-pratiques-en-espace-de-travail-partage.png","width":1344,"height":768,"caption":"discover the best IT security practices to adopt in a shared workspace to protect your data and avoid cyberthreats in the office."},{"@type":"BreadcrumbList","@id":"https:\/\/hiptown.com\/en\/it-security-best-practices-for-shared-workspaces\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hiptown.com\/en\/"},{"@type":"ListItem","position":2,"name":"General","item":"https:\/\/hiptown.com\/en\/category\/general\/"},{"@type":"ListItem","position":3,"name":"Coworking","item":"https:\/\/hiptown.com\/en\/category\/general\/coworking\/"},{"@type":"ListItem","position":4,"name":"IT security: best practices for shared workspaces"}]},{"@type":"WebSite","@id":"https:\/\/hiptown.com\/en\/#website","url":"https:\/\/hiptown.com\/en\/","name":"Hiptown Coworking et bureau flexibles et op\u00e9r\u00e9","description":"Coworking, Bureaux flexibles et op\u00e9r\u00e9s cl\u00e9 en main. Partout en France.","publisher":{"@id":"https:\/\/hiptown.com\/en\/#organization"},"alternateName":"Hiptown bureaux \u00e0 louer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hiptown.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hiptown.com\/en\/#organization","name":"Hiptown Coworking et bureau \u00e0 louer ou op\u00e9r\u00e9","alternateName":"Hiptown bureaux \u00e0 louer","url":"https:\/\/hiptown.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hiptown.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2022\/07\/hiptown_logo-xs.svg","contentUrl":"https:\/\/hiptown.com\/wp-content\/uploads\/sites\/6\/2022\/07\/hiptown_logo-xs.svg","width":98,"height":75,"caption":"Hiptown Coworking et bureau \u00e0 louer ou op\u00e9r\u00e9"},"image":{"@id":"https:\/\/hiptown.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hiptownlovesyou\/","https:\/\/x.com\/hiptownlovesyou","https:\/\/www.instagram.com\/hiptownlovesyou\/","https:\/\/fr.linkedin.com\/company\/hiptown","https:\/\/www.youtube.com\/channel\/UCNtbRT8HkE3s0F0AMaxX9VQ"]},{"@type":"Person","@id":"https:\/\/hiptown.com\/en\/#\/schema\/person\/f303ab8dda6ce73445aaf54fc71d54bb","name":"Ludovic C\u00e9l\u00e9rier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96bd8a0de5d7b26189596afbe307c9cca8e75d5a75c9894e4e564b97a65a208d?s=96&d=mm&r=g","caption":"Ludovic C\u00e9l\u00e9rier"},"description":"Fondateur de Hiptown"}]}},"_links":{"self":[{"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/posts\/28910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/comments?post=28910"}],"version-history":[{"count":2,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/posts\/28910\/revisions"}],"predecessor-version":[{"id":28930,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/posts\/28910\/revisions\/28930"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/media\/28911"}],"wp:attachment":[{"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/media?parent=28910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/categories?post=28910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hiptown.com\/en\/wp-json\/wp\/v2\/tags?post=28910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}