Tip • April 29, 2025
IT security - a sub-area of information security
What is IT security and why is it so important? Understand the difference between IT security, cyber security and information security.
Tip 7 reasons to protect your Office 365 email from cyberattacks Businesses aren't the only ones adopting Office 365. Hackers are also taking a close interest, particularly with increasingly sophisticated phishing techniques. Sébastien Gest, Tech Evangelist at Vade Secure, gives us 7 reasons to secure your business email.
Tip Ransomware attack: don't give in to blackmail by hackers and skilfully foil their traps What could be worse for a company than to have its data taken hostage? To avoid ransomware attacks, it's best to understand what they are, and how to protect yourself effectively.
Word from the expert How to prevent your email identity from being stolen? 55% of global email traffic is spam and phishing. Find out how to protect yourself from these attacks.
Tip • April 29, 2025
IT security - a sub-area of information security
What is IT security and why is it so important? Understand the difference between IT security, cyber security and information security.
Tip • November 13, 2024
How can you protect your business from cryptoviruses?
Cryptoviruses are malicious software programs. Increasingly frequent, they require upstream intervention to limit the damage.
Definition • October 29, 2024
Dictionary attack: what if a password dictionary was the solution?
A password dictionary isn't just useful for hackers. Companies can also use them to check the strength of their passwords against dictionary attacks! Find out how.
Definition • October 29, 2024
How can DMARC authenticate your e-mails?
5 letters for 2 main issues: less spam and more deliverability for your e-mails. Authenticate your e-mails, improve your reputation and stand out from the crowd!
Tip • October 29, 2024
Cybercrime: examples and measures to protect sensitive projects
Lionel Roux, CEO of Wimi, makes us aware of the dangers lurking in IT security, and gives us some excellent advice on how to guard against threats.
Word from the expert • October 29, 2024
Understand the concept of cybersecurity to (better) protect your business
Among all the sensitive subjects linked to the development of digital technology in the workplace, there is one that worries us more than any other: cybersecurity. Here's how it works.
Definition • October 29, 2024
What is FGPP, or how to apply a refined password policy?
What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.
Definition • October 29, 2024
Shadow IT: a new threat to corporate IT security?
What is shadow IT, a practice increasingly encountered in the enterprise? We take a look at the risks, opportunities and ways forward for shadow IT.
Tip • October 28, 2024
How do you set up an effective IT incident management process?
Why implement an ITIL-standardized incident management process, and how do you go about it? Find out in this article.
Tip • November 16, 2020
Everything about Corporate Data Security Policy and Procedures
What is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.