Our Latest Posts

In the 1990s, scientific researchers predicted that if a very powerful computer came on the market, it would be able to decipher encrypted business or government data in record time. If you never heard of the quantum computer project, you should know that for some people, it would be considered the greatest threat to data…

Between the ages of 7 and 77, the perception of “cyber-security” may differ from one generation to the next. Whether you are a Xennial,[1] a Millenial,[2] a gen-Z[3] or an Alpha,[4] your awareness of data protection issues, your consumption of social media and your online behavior vary, putting you more or less at risk. A…

Data protection

At a time when our daily professional activities require us to be almost constantly connected, whether on a computer, a tablet or a smartphone, cybersecurity is proving to be essential for any organization. Protecting your digital assets means protecting the growth and future of your business in order to remain efficient and sustainable. If there…

According to the latest McAfee report, cyber-attacks against cloud accounts have increased 630% due to the expansion of telecommuting. These are mostly orchestrated by foreign attackers located in China, Russia and Iran. With the fragmentation of corporate information systems security, which creates gaps, and organizational changes, such as the massive shift toward telecommuting, hackers are…

One third of employees were forced to change their way of working during lockdown; ways French people would like to pursue in the future: 73% of employees want to continue working remotely beyond the lockdown period (Onelogin survey, April 2020). A trend which is also confirmed with our European neighbors: 67% of employees in Ireland…

Far from being opposed, both CIO and CISO follow different but complementary objectives. A partnership in security expertise is key to optimal protection of information systems and essential collaboration to convince executive committees and employees.   1- Steering the global strategy in a consistent cyber-responsible approach The nature of risks has fundamentally changed along with…

“Employees are at the center of security, and they are at the same time the common denominator and the most random variable!” explains Pascaline Abdini, General Manager, Cluster Défense Sécurité.   1- Implement and update a security policy suited to business needs CIOs and CISOs must define an information system security policy aligned with business…

The COVID-19 pandemic is now forcing more than 3.4 billion people[1] throughout the world to be confined to their homes, causing unprecedented economic, social and political upheaval. According to the latest Cyber Threat Assessment report published by Thales Security, employees are the preferred target of threat actors to reach an organization’s information systems. As a…

  1- STAY ALERT ABOUT WEBSITES YOU VISIT, ATTACHMENTS AND LINKS YOU RECEIVE AND APPLICATIONS YOU INSTALL WHAT ARE THE RISKS?Virus and malware infections, devices locked, ransomware, business and personal data leaks 2- USE BUSINESS DATA SHARING AND COLLABORATIVE SOLUTIONS APPROVED BY YOUR LEADERSHIP WHAT ARE THE RISKS?Scattering of your data on various platforms not…

Today, CISOs must support their organization and its employees with their various business challenges. They build their organization’s security strategy and assume responsibility in the event of a security incident. However, it takes time for a strategy to bear fruit. The problem is that CISOs often do not have the necessary time between defining a…