Definition • 28 May 2025
What is patch management in IT? Definition, best practices and tools
Why is patch management crucial to IT security? Definition, process, risks and recommended software.
Tip Incident management process, to transform crises into opportunities for continuous improvement Find out why and how to set up a standardised incident management procedure, and a selection of software to support you.
Tip Why is it (absolutely) necessary for your company to adopt an IT security policy? Viruses, cyber-attacks, hacking, espionage, data loss, etc. In the face of these threats, make sure you adopt an IT security policy.
Definition What is a botnet? Everything you need to know to protect your devices from attack A botnet can turn your device into a weapon without you even knowing it. Find out how they work, what they are used for and how to protect yourself effectively.
Definition • 28 May 2025
What is patch management in IT? Definition, best practices and tools
Why is patch management crucial to IT security? Definition, process, risks and recommended software.
Definition • 28 May 2025
The 10 different types of computer attack to be aware of in 2025
Learn to identify the 10 most common types of computer attack in 2025 and discover how to better protect your data in the face of new threats.
Definition • 28 May 2025
The 10 different types of computer attack to be aware of in 2025
Learn to identify the 10 most common types of computer attack in 2025 and discover how to better protect your data in the face of new threats.
Software • 16 May 2025
Protect your data with anti-ransomware software: our top 10
Discover our list of the best anti-ransomware software of 2025. We compare the key features, prices and benefits.
Definition • 30 April 2025
Deciphering the phishing attack, so you don't take the bait!
Find out what a phishing attack is, how to recognise it and what measures you can take to protect your personal and business data effectively.
Definition • 30 April 2025
Whaling, or when hackers target the big fish
Find out what whaling is, a targeted form of phishing aimed at executives, and learn how to detect it with practical advice and tailored cybersecurity tools.
Mailinblack
Cybersecurity
Data Protection
Computer Security
Vulnerability Scanner
Anti Spam
EventLog Analyzer
Log Management
Learn more about EventLog Analyzer
Kaspersky Small Office Security
Cybersecurity
Learn more about Kaspersky Small Office Security
Specops Password Policy
Computer Security
Learn more about Specops Password Policy
Merox
Computer Security
Learn more about Merox
iLock Security Services
Computer Security
Learn more about iLock Security Services
XyLoc Security Server
Computer Security
Learn more about XyLoc Security Server
inWebo
Computer Security
Learn more about inWebo
Splunk Enterprise Security
Computer Security
Learn more about Splunk Enterprise Security
DatAlert
Computer Security
Learn more about DatAlert
Data Classification
Computer Security
Learn more about Data Classification
Stormshield Endpoint security
Computer Security
Learn more about Stormshield Endpoint security
E MAIL SECURITY
Computer Security
Learn more about E MAIL SECURITY
Definition • 29 April 2025
The computer worm, a threat that crawls... and strikes fast!
We've put together a complete guide, including security measures, to find out everything you need to know about computer worms, the threat that crawls up on you and strikes fast!
Tip • 28 April 2025
Between best practices and tools, how to guarantee your company's IT security
What are the main IT security risks facing your business? This article guides you through the best practices for ensuring your protection, and the essential tools to help you do so.
Definition • 25 April 2025
The magic link, or how to combine user experience and cybersecurity
Find out what a magic link is: a simple, fast and secure method of authentication without passwords. Benefits, how it works, use cases... we explain it all!
Tip • 13 November 2024
How can you protect your business from cryptoviruses?
Cryptoviruses are malicious software. Increasingly common, they require upstream intervention to limit the damage.
Word from the expert • 29 October 2024
Understand the concept of cybersecurity to (better) protect your business
Of all the sensitive issues linked to the development of digital technology in business, there is one that worries us more than any other: cybersecurity. Here's why.
Definition • 29 October 2024
How can you ensure that your emails are authenticated using DMARC?
5 letters for 2 main issues: less spam and more deliverability for your emails. Authenticate your emails, improve your reputation and stand out from the crowd!
Definition • 29 October 2024
Shadow IT: a new threat to corporate IT security?
What is shadow IT, a practice that is becoming increasingly common in companies? We take a look at the risks, opportunities and areas for improvement in shadow IT.
Tip • 29 October 2024
Cybercrime: examples and measures to protect sensitive projects
Lionel Roux, CEO of Wimi, makes us aware of the dangers hanging over IT security and gives us some excellent advice on how to guard against threats.
Definition • 29 October 2024
What is the FGPP, or how to apply a refined password policy?
What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.
Definition • 29 October 2024
Dictionary attack: what if a password dictionary was the solution?
A password dictionary isn't just useful for hackers. Companies can also use it to check the strength of their passwords against dictionary attacks! Find out how.
Tip • 16 November 2020
Everything About Corporate Data Security Policy
What is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.