Our Latest Posts

Are the smartphones of your organization secure?


Publié par Raphaël Basset - 3 December 2018

Our smartphones are essential to our professional lives and contain a growing amount of information. We store customer contact details, emails, private communications, instant messages, and even financial and strategic information. In case of loss, theft or breach of a smartphone, the whole organization can be impacted. Especially if it is operating in a highly…

Wifi: are you really well protected?


Publié par Raphaël Basset - 3 December 2018

Connectivity and mobility are the two words that characterize the work of professionals today. For most managers and executives, it is impossible to work without Wifi. However, while digital transformation has profoundly changed the flow of communications and internal processes for organizations, it has also opened the door to new threats. Cyber threats are taken…

How to protect your business against mobile cyber threats? – Act II


Publié par Raphaël Basset - 6 November 2018

 At the heart of a mobile security strategy, now essential to any organization, lies the identification of threats, impacts and technical measures to be implemented to protect your smartphones, communications and mobile data. These technical measures are covered by a teeming ecosystem of business solutions, which still lacks clarity: Explanations and recommendations on Enterprise Mobility…

Different cyber threats which are targeting your organization's mobile communications and data (shadow IT, mobile app, Wifi)

With more collaborative ways of working, multiple devices (PCs, smartphones, tablets, etc.) and smart objects (IoT), today’s business environment is complex, and makes it even more difficult to enforce security policies. Cyber criminals understand this very well, and are now moving away from servers and computers to target mobile devices and the IoT. In its…

Translation of the Lefigaro.fr article published on 11th June 2018 (source article) The President of the United States is not using a secure phone. Phone security is however a key issue for leaders. Le Figaro takes a look at the risks and the actions implemented to avoid them. Donald Trump is not particularly concerned with protecting his…

Translation of the BFM article published on 9th November 2017 (source article)   Emmanuel Macron has an ultra-secure smartphone that will surprise many. It is a Samsung Galaxy smartphone prepared by Ercom and Orange Cyber Defense. Best-in-class confidentiality. From 2006 to 2017, in addition to their personal device, Jacques Chirac, Nicolas Sarkozy and François Hollande…

Interpretability: the missing link in Machine Learning adoption for fraud detection Machine learning methods are increasingly used, especially in anti-fraud products (developed by Ercom Analytics and other vendors) to capture weak signals and spot patterns in data that humans would otherwise miss. If the relevance of these methods for fraud detection is widely recognized, they…

Credit card fraud is the most visible type of consumer fraud: According to The Nilson Report, global damages caused by credit card fraud reached 21 billion dollars (18.4 billion euros) in 2015. Less known to consumers, wire transfer fraud (see https://blog.ercom.fr/social-engineering-and-its-consequences/) catches the attention of banks seeking to protect their customers, as one single such attack may siphon…

While the media highlight increasingly sophisticated cyber-attacks, decision-makers could easily forget that humans are one of the main weak links of IT security. According to the latest IBM – Ponemon Institute report published in 2016, 25% of data leaks are due to human error or negligence. Social engineering is about exploiting human weakness to obtain…

February 28, 2017  |  By Rick Robinson from Security Intelligence Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data that’s placed in the cloud. The trend of adopting public cloud solutions continues to grow, but protecting critical data in…