Tip • 29 April 2025
IT security - a sub-area of information security
What is IT security and why is it so important? Understand the difference between IT security, cyber security and information security.
Tip 7 reasons to protect your Office 365 email from cyber attacks Businesses aren't the only ones adopting Office 365. Hackers are also taking a close interest, particularly with increasingly sophisticated phishing techniques. Sébastien Gest, Tech Evangelist at Vade Secure, gives us 7 reasons to secure your business email.
Tip Ransomware attack: don't give in to blackmail by hackers and cleverly foil their traps What could be worse for a company than to have its data taken hostage? To avoid ransomware attacks, it's best to understand what they are and how to protect yourself effectively.
Word from the expert How can you prevent your email identity being stolen? 55% of email traffic worldwide is spam and phishing. Find out how to protect yourself from these attacks.
Tip • 29 April 2025
IT security - a sub-area of information security
What is IT security and why is it so important? Understand the difference between IT security, cyber security and information security.
Tip • 13 November 2024
How can you protect your business from cryptoviruses?
Cryptoviruses are malicious software. Increasingly common, they require upstream intervention to limit the damage.
Definition • 29 October 2024
Dictionary attack: what if a password dictionary was the solution?
A password dictionary isn't just useful for hackers. Companies can also use it to check the strength of their passwords against dictionary attacks! Find out how.
Tip • 29 October 2024
Cybercrime: examples and measures to protect sensitive projects
Lionel Roux, CEO of Wimi, makes us aware of the dangers hanging over IT security and gives us some excellent advice on how to guard against threats.
Definition • 29 October 2024
How can you ensure that your emails are authenticated using DMARC?
5 letters for 2 main issues: less spam and more deliverability for your emails. Authenticate your emails, improve your reputation and stand out from the crowd!
Definition • 29 October 2024
What is the FGPP, or how to apply a refined password policy?
What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.
Word from the expert • 29 October 2024
Understand the concept of cybersecurity to (better) protect your business
Of all the sensitive issues linked to the development of digital technology in business, there is one that worries us more than any other: cybersecurity. Here's why.
Definition • 29 October 2024
Shadow IT: a new threat to corporate IT security?
What is shadow IT, a practice that is becoming increasingly common in companies? We take a look at the risks, opportunities and areas for improvement in shadow IT.
Tip • 28 October 2024
How do you set up an effective IT incident management process?
Why implement an ITIL-standard incident management process, and how do you go about it? Find out in this article.
Tip • 16 November 2020
Everything About Corporate Data Security Policy
What is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.