Mobile Threat Defense Guide 2018

Our highly digital world has fundamentally changed companies’ organization. Smartphones and tablets are now at the center of our personal and professional usages, with an average of 5 hours per day spent on them. In constant demand of immediacy, the new employee is mobile, flexible and always connected. In the last decade, organizations have whether equipped themselves with corporate mobile devices…

Supply Chain Management and Supply Chain Security: Addressing Vulnerabilities with PAM

Supply chains are essential for the proper functioning of industrial systems and critical infrastructure. However, they’re also quite messy, in terms of security. Supply chains invariably connect users and systems from multiple entities, often in different countries. This setup exposes every company in the supply chain to cyber risk. Among countermeasures, Privileged Access Management (PAM) offers one of the best ways of…

Summary of the most jaw-dropping ransomware on the planet

Having been highly publicised and popularised after the WannCry and NotPetya incidents, ransomware is now squarely in the public domain. Forbes France Magazine even suggests that 20,000 computers a month are infected with malicious software in France. But did you know that there are ransoms and, well, ransoms? A summary of the most surprising ransomware of the past few years.…

Small businesses and cyber-attacks: the 10 most common threats

  Connected but often with little protection, small businesses are manna from heaven for cyber-criminals and hackers. E-mails, wifi network, USB keys, etc. Discover the 10 most common entry points in micro, small and medium-sized businesses*. 1- E-mail E-mail is undoubtedly the most common means by which to be hacked. A malicious attachment is often the preferred vector for phishing…