CYBER SECURITY - Good practices

Good practices in Cyber security

Cyber security is not just about the measures we take to protect from cyber threat, but also about how everyone in our ecosystem can contribute to a more secure digital environment.

Here are some best practices we recommend everyone follow to keep your business secure.



Our advice to protect you

Beware of phishing attempts
  • Be careful when opening emails or attachments or clicking on links from unknown sources
  • Phishing emails often try to trick you into disclosing confidential information or installing malware
  • Hackers play on a sense of urgency and/or emotional manipulation
  • These emails may have spelling mistakes
  • Pay attention to the sender of the email (cma-cgm.com and not cmacgm.com or any other incorrect spelling)
  • Do not pass on any confidential information to the expeditors (If in doubt, please contact your Local Agency)

Use strong, unique passwords to keep your confidential data secure
  • Create complex and strong passwords or passphrases for each of your accounts (long password, with figures, case and capital letters, special characters, not using your personal pets, or family names...)
  • Use a digital password safe/vault to store them securely
  • Avoid using easily guessable information like birthday or common words
  • Keep your password private, no one is supposed to ask it from you
  • Renew your password regularly

Enable Multi Factor Authentification (MFA), securing data and preventing cyber attacks
  • Whenever possible, enable MFA for your online accounts
  • Multi Factor Authentification is a multi-step authentification process that requires you to enter additional information beyond your simple password
  • This adds an extra layer of security by requiring you to provide a second verification method, such as a one-time code generated from or sent to your mobile device

Keep software and systems updated

Regularly update your operating system, software applications, and antivirus programs. These updates often include patches for known vulnerabilities.


Payment

Some payments are processed through a secure platform and we will never ask for your credit card number in an email or phone call, or make a bank transfer.


Due to inactivity, your session is about to expire.
You will be logged out in minutes and all unsaved actions will be lost.


I am here, let's continue

Due to inactivity, your session has expired.


Go to the login page