Our Latest Posts

How to raise employee awareness and reduce digital risks


Publié par Raphaël Basset - 4 January 2019

Viruses, ransomware, mobile malware, phishing… Cyber-attacks are permanent and organizations are under constant threats from attackers. To face these, IT departments require appropriate resources, expertise and tools. But not only. Employees are the weak link in all organizations due to the vast majority of cyber threats targeting them. Whether a CEO, sales executive, receptionist or…

All employees in an organization use applications. Whether on a local computer, a server on site or in the cloud, as a service, on a mobile or tablet… Applications are important, and for good reason, as they allow us to work more efficiently. But applications are synonym of threats. The software you use every day…

Are the smartphones of your organization secure?


Publié par Raphaël Basset - 3 December 2018

Our smartphones are essential to our professional lives and contain a growing amount of information. We store customer contact details, emails, private communications, instant messages, and even financial and strategic information. In case of loss, theft or breach of a smartphone, the whole organization can be impacted. Especially if it is operating in a highly…

Wifi: are you really well protected?


Publié par Raphaël Basset - 3 December 2018

Connectivity and mobility are the two words that characterize the work of professionals today. For most managers and executives, it is impossible to work without Wifi. However, while digital transformation has profoundly changed the flow of communications and internal processes for organizations, it has also opened the door to new threats. Cyber threats are taken…

How to protect your business against mobile cyber threats? – Act II


Publié par Raphaël Basset - 6 November 2018

At the heart of a mobile security strategy, now essential to any organization, lies the identification of threats, impacts and technical measures to be implemented to protect your smartphones, communications and mobile data. These technical measures are covered by a teeming ecosystem of business solutions, which still lacks clarity: Explanations and recommendations on Enterprise Mobility…

Different cyber threats which are targeting your organization's mobile communications and data (shadow IT, mobile app, Wifi)

With more collaborative ways of working, multiple devices (PCs, smartphones, tablets, etc.) and smart objects (IoT), today’s business environment is complex, and makes it even more difficult to enforce security policies. Cyber criminals understand this very well, and are now moving away from servers and computers to target mobile devices and the IoT. In its…

Translation of the Lefigaro.fr article published on 11th June 2018 (source article) The President of the United States is not using a secure phone. Phone security is however a key issue for leaders. Le Figaro takes a look at the risks and the actions implemented to avoid them. Donald Trump is not particularly concerned with protecting his…

This is the ultra-secure smartphone used by Emmanuel Macron


Publié par agencecoccinet - 14 June 2018

Translation of the BFM article published on 9th November 2017 (source article)   Emmanuel Macron has an ultra-secure smartphone that will surprise many. It is a Samsung Galaxy smartphone prepared by Ercom and Orange Cyber Defense. Best-in-class confidentiality. From 2006 to 2017, in addition to their personal device, Jacques Chirac, Nicolas Sarkozy and François Hollande…

Interpretability: the missing link in Machine Learning adoption for fraud detection Machine learning methods are increasingly used, especially in anti-fraud products (developed by Ercom Analytics and other vendors) to capture weak signals and spot patterns in data that humans would otherwise miss. If the relevance of these methods for fraud detection is widely recognized, they…

Credit card fraud is the most visible type of consumer fraud: According to The Nilson Report, global damages caused by credit card fraud reached 21 billion dollars (18.4 billion euros) in 2015. Less known to consumers, wire transfer fraud (see https://blog.ercom.fr/social-engineering-and-its-consequences/) catches the attention of banks seeking to protect their customers, as one single such attack may siphon…