Want to know more ?Call our experts !
Experiencing a security issue ?Don't panic, contact us !
Blog articles
Ethical hackers and cybersecurity
Now commonly used, the word "hacker" first appeared in the 1960s at MIT (Massachusetts Institute of Technology). While the term is generally associate...
Good resolutions and best IT practices
Who says new year says good resolutions. And this also applies to cybersecurity! Let’s begin the year with some best practises and daily cybersec...
Internet shopping: watch out for cyber scams!
According to the latest report from Kaspersky, online shoppers are becoming victims of choice for hackers. Indeed, compared to last year, we not...
Ransomware: the hackers' favorite weapon?
Ransomware is back ! At least that's what McAfee's latest report on ransomware suggests. As a result, ransomware attacks increased by 118% in the...
Cybersecurity emergency for health organizations
Paralyzed hospitals, pacemaker or insulin pump disruption, resale of medical data ... Examples of malicious attacks in the health sector are not...
Cloud and data leaks: how to protect your business?
The cloud is on everyone's lips and already used mainly by companies around the world. The cloud is on the rise. But like any other t...
Cybersecurity challenges for companies
The security market has known in recent years revelations. Although they were widely known by insiders, it confirms that attacks are no longer th...
Securing connected objects (IoT)
The democratization and multiplication of connected objects in homes and businesses are new doors for attackers. These objects are now an integra...
Enterprise vulnerability management: from detection to ...
Step 1: Defining safety rules The Information Systems Security Policy (ISSP) sets out the cybersecurity rules that a company or organisa...
This website uses cookies to ensure you get the best experience on our website. Learn more. Accept cookies