Our Latest Posts

Between the ages of 7 and 77, the perception of “cyber-security” may differ from one generation to the next. Whether you are a Xennial,[1] a Millenial,[2] a gen-Z[3] or an Alpha,[4] your awareness of data protection issues, your consumption of social media and your online behavior vary, putting you more or less at risk. A…

Data protection

At a time when our daily professional activities require us to be almost constantly connected, whether on a computer, a tablet or a smartphone, cybersecurity is proving to be essential for any organization. Protecting your digital assets means protecting the growth and future of your business in order to remain efficient and sustainable. If there…

According to the latest McAfee report, cyber-attacks against cloud accounts have increased 630% due to the expansion of telecommuting. These are mostly orchestrated by foreign attackers located in China, Russia and Iran. With the fragmentation of corporate information systems security, which creates gaps, and organizational changes, such as the massive shift toward telecommuting, hackers are…

One third of employees were forced to change their way of working during lockdown; ways French people would like to pursue in the future: 73% of employees want to continue working remotely beyond the lockdown period (Onelogin survey, April 2020). A trend which is also confirmed with our European neighbors: 67% of employees in Ireland…

Far from being opposed, both CIO and CISO follow different but complementary objectives. A partnership in security expertise is key to optimal protection of information systems and essential collaboration to convince executive committees and employees.   1- Steering the global strategy in a consistent cyber-responsible approach The nature of risks has fundamentally changed along with…

“Employees are at the center of security, and they are at the same time the common denominator and the most random variable!” explains Pascaline Abdini, General Manager, Cluster Défense Sécurité.   1- Implement and update a security policy suited to business needs CIOs and CISOs must define an information system security policy aligned with business…

The COVID-19 pandemic is now forcing more than 3.4 billion people[1] throughout the world to be confined to their homes, causing unprecedented economic, social and political upheaval. According to the latest Cyber Threat Assessment report published by Thales Security, employees are the preferred target of threat actors to reach an organization’s information systems. As a…

  1- STAY ALERT ABOUT WEBSITES YOU VISIT, ATTACHMENTS AND LINKS YOU RECEIVE AND APPLICATIONS YOU INSTALL WHAT ARE THE RISKS?Virus and malware infections, devices locked, ransomware, business and personal data leaks 2- USE BUSINESS DATA SHARING AND COLLABORATIVE SOLUTIONS APPROVED BY YOUR LEADERSHIP WHAT ARE THE RISKS?Scattering of your data on various platforms not…

Today, CISOs must support their organization and its employees with their various business challenges. They build their organization’s security strategy and assume responsibility in the event of a security incident. However, it takes time for a strategy to bear fruit. The problem is that CISOs often do not have the necessary time between defining a…

Intellectual service providers (consultants, auditors, lawyers, notaries, etc.) handle sensitive information for many clients on a daily basis. The digital transformation landscape in which every organization is now evolving imposes new ways of working, combining efficiency and mobility across functions. Then comes the topic of cyber-security. If collaborative tools are indispensable nowadays to work anytime…