
Grégory has been a cybersecurity consultant at Squad since June 2019.
His current role involves working with a transport and logistics group as an administrator and Kaspersky antivirus security advisor.
How did you get into cybersecurity, and why did you choose SQUAD?
I started my professional career through a work-study program with a professional contract as a Level 2 system administrator in the banking sector.
Over the years, I have developed professionally and technically within various IT services and digital services companies, providing services to large groups, before eventually moving into the world of cybersecurity.
SQUAD stood out by offering me the opportunity to receive support and gain a better understanding of the cyber world, but also through the friendliness and professionalism of the group.
It seems to me that—incidentally—you have activities that are very directly related to smartphones... Can you tell us a little more about that?
In addition to my professional life at SQUAD, I also provide troubleshooting and repair services for all portable communication devices.
The initial goal was to assist consumers with the general maintenance of their "precious devices," but also to raise awareness about the sensitivity of the data they contain in relation to vulnerabilities that could potentially hinder their lifestyle (whether personal or professional).
Today, I see that these two activities complement each other. It's very interesting for me to have technical expertise in mobile devices and a genuine focus on cybersecurity in businesses. My two activities complement each other.
There is a lot of talk about vulnerabilities affecting servers and personal computers... At the same time, cyber issues are beginning to emerge on smartphones. What is your view on cyber security versus devices and their vulnerability?
It is true that today, most users store as much information as possible on their smartphone(s): photos, videos, emails, personal data, etc. They do so without necessarily thinking that this information is not protected against potential attacks.
Paradoxically, while the amount of personal data stored on smartphones is exploding, the general public seems relatively unconcerned about the vulnerabilities of their devices.
"It is crucial that users feel concerned about cybersecurity...and their smartphones or tablets are excellent examples for learning best practices."
Lending your smartphone to someone else (even a child) is a real risk, because you don't know which apps (verified or infected) they might want to install. What's more, inadequate smartphone security settings can lead to direct access to numerous apps containing a wealth of personal data (particularly emails and social media). Once a phone is unlocked, it can open doors to other more sensitive areas.
To take this further, we are now seeing malicious technologies appearing on smartphone connectors, as evidenced by this article in Capital (https://www.capital.fr/lifestyle/attention-si-vous-empruntez-le-chargeur-de-telephone-dun-inconnu-1347673). Simply by using a phone charger that does not belong to us, we expose ourselves to the risk of our device being hacked.
Hackers have been interested in mobile devices for quite some time. What is new, however, and very positive, is that people are starting to talk about it today. It is crucial that users feel concerned about cybersecurity...and their smartphones or tablets are excellent examples for learning best practices.
A smartphone is above all a personal item, bordering on intimate... Do you have any tips for optimizing its security?
Here are some recommendations that I always advise, regardless of how you intend to use it (personal/professional):
- Back up data at least once a week, on a secure medium.
- Use secure, reliable applications that are certified by the platform used (iOS or Android).
- Secure your device using one or more of the following locking methods:
- PIN code with more than 4 digits (non-consecutive),
- Password mode: alphanumeric, minimum 8 characters.
- If possible, implementation of a complex scheme (on Android),
- Fingerprint, facial, and/or eye recognition.
These recommendations (although obvious) are important and apply to all ages. In the event that your phone is lost, stolen, or accessed without your knowledge by a third party, these simple best practices will help prevent any information leaks.
To take this a step further, there are now two-factor authentication apps that enable smartphones to provide a high level of security in our daily lives. These solutions are very often mandatory on business devices.
Finally, some models offer the option of encryption (this option is usually found in the security settings). If the unlock code is entered incorrectly, all data stored on the device is deleted, returning it to factory settings. This may seem like a drastic measure, but it is essential. It limits the damage caused to the user to a simple hardware issue.
All data remains protected by this method, preventing more serious consequences such as identity theft or the compromise of other services (contacts, emails, banking, etc.).
