The contact, a first step for your cybersecurity