Latest articles

How can you ensure that your emails are authenticated using DMARC?

Definition • 29 October 2024

How can you ensure that your emails are authenticated using DMARC?

5 letters for 2 main issues: less spam and more deliverability for your emails. Authenticate your emails, improve your reputation and stand out from the crowd!

What is the FGPP, or how to apply a refined password policy?

Definition • 29 October 2024

What is the FGPP, or how to apply a refined password policy?

What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.

Understand the concept of cybersecurity to (better) protect your business

Word from the expert • 29 October 2024

Understand the concept of cybersecurity to (better) protect your business

Of all the sensitive issues linked to the development of digital technology in business, there is one that worries us more than any other: cybersecurity. Here's why.

Shadow IT: a new threat to corporate IT security?

Definition • 29 October 2024

Shadow IT: a new threat to corporate IT security?

What is shadow IT, a practice that is becoming increasingly common in companies? We take a look at the risks, opportunities and areas for improvement in shadow IT.

How do you set up an effective IT incident management process?

Tip • 28 October 2024

How do you set up an effective IT incident management process?

Why implement an ITIL-standard incident management process, and how do you go about it? Find out in this article.

Everything About Corporate Data Security Policy

Tip • 16 November 2020

Everything About Corporate Data Security Policy

What is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.