Latest articles

[Case study] How Intrapole improved its outsourcing with RMM software

Software • May 1, 2025

[Case study] How Intrapole improved its outsourcing with RMM software

Using RMM software is the easiest way for an IT service provider to remotely monitor and control their customers' IT systems or IT assets. In this case study, Guillaume Duval, head of Intrapole, explains how they improved their outsourcing with Atera software.

[Case study] How Intrapole improved its outsourcing with RMM software

Software • May 1, 2025

[Case study] How Intrapole improved its outsourcing with RMM software

Using RMM software is the easiest way for an IT service provider to remotely monitor and control their customers' IT systems or IT assets. In this case study, Guillaume Duval, head of Intrapole, explains how they improved their outsourcing with Atera software.

EIPD: how to automate the GDPR impact assessment

Tip • April 30, 2025

EIPD: how to automate the GDPR impact assessment

The EIPD or impact assessment is one of the new features of the GDPR. Find out how to mitigate data protection risks.

EIPD: how to automate the GDPR impact assessment

Tip • April 30, 2025

EIPD: how to automate the GDPR impact assessment

The EIPD or impact assessment is one of the new features of the GDPR. Find out how to mitigate data protection risks.

IT security - a sub-area of information security

Tip • April 29, 2025

IT security - a sub-area of information security

What is IT security and why is it so important? Understand the difference between IT security, cyber security and information security.

TOP 10 common network threats & how to prevent them

Tip • April 27, 2025

TOP 10 common network threats & how to prevent them

Discover our top 10 most common network security threats, and what tools to use in order to prevent them