Our Latest Posts

 At the heart of a mobile security strategy, now essential to any organization, lies the identification of threats, impacts and technical measures to be implemented to protect your smartphones, communications and mobile data. These technical measures are covered by a teeming ecosystem of business solutions, which still lacks clarity: Explanations and recommendations on Enterprise Mobility … Continue reading How to protect your business against mobile cyber threats? – Act II

Different cyber threats which are targeting your organization's mobile communications and data (shadow IT, mobile app, Wifi)

With more collaborative ways of working, multiple devices (PCs, smartphones, tablets, etc.) and smart objects (IoT), today’s business environment is complex, and makes it even more difficult to enforce security policies. Cyber criminals understand this very well, and are now moving away from servers and computers to target mobile devices and the IoT. In its … Continue reading What cyber threats are targeting your organization’s mobile communications and data? – Act I

Translation of the Lefigaro.fr article published on 11th June 2018 (source article) The President of the United States is not using a secure phone. Phone security is however a key issue for leaders. Le Figaro takes a look at the risks and the actions implemented to avoid them. Donald Trump is not particularly concerned with protecting his … Continue reading Sensitive data, eavesdropping, hacking: Securing phones for heads of state

Translation of the BFM article published on 9th November 2017 (source article)   Emmanuel Macron has an ultra-secure smartphone that will surprise many. It is a Samsung Galaxy smartphone prepared by Ercom and Orange Cyber Defense. Best-in-class confidentiality. From 2006 to 2017, in addition to their personal device, Jacques Chirac, Nicolas Sarkozy and François Hollande … Continue reading This is the ultra-secure smartphone used by Emmanuel Macron

Interpretability: the missing link in Machine Learning adoption for fraud detection Machine learning methods are increasingly used, especially in anti-fraud products (developed by Ercom Analytics and other vendors) to capture weak signals and spot patterns in data that humans would otherwise miss. If the relevance of these methods for fraud detection is widely recognized, they … Continue reading Fraud and interpretability of machine learning models

Credit card fraud is the most visible type of consumer fraud: According to The Nilson Report, global damages caused by credit card fraud reached 21 billion dollars (18.4 billion euros) in 2015. Less known to consumers, wire transfer fraud (see https://blog.ercom.fr/social-engineering-and-its-consequences/) catches the attention of banks seeking to protect their customers, as one single such attack may siphon … Continue reading Fighting fraud: From Big Data to Fast Data

While the media highlight increasingly sophisticated cyber-attacks, decision-makers could easily forget that humans are one of the main weak links of IT security. According to the latest IBM – Ponemon Institute report published in 2016, 25% of data leaks are due to human error or negligence. Social engineering is about exploiting human weakness to obtain … Continue reading Social engineering and its consequences

February 28, 2017  |  By Rick Robinson from Security Intelligence Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data that’s placed in the cloud. The trend of adopting public cloud solutions continues to grow, but protecting critical data in … Continue reading Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

Cryptobox is a new secure collaborative solution enabling employees to securely share information internally and externally. Provided by Ercom, a company specializing in secure communications for nearly 30 years, Cryptobox ensures businesses can exchange information confidentially using end to end encryption. Easy to use and easy to deploy, Cryptobox is available on all types of hosting … Continue reading Cryptobox: the new secure data sharing solution for professionals

Data management is now at the heart of corporate strategies. Even if the cloud fulfills its promises in terms of access flexibility and cost of storage, not all software solutions are suitable for professional use. Due to tighter EU data legislation and increasing exposure to data loss, Ercom is now launching Cryptobox, the first secure … Continue reading Cryptobox: secure Cloud for professionals