Tip•29 October 2024Cybercrime: examples and measures to protect sensitive projectsLionel Roux, CEO of Wimi, makes us aware of the dangers hanging over IT security and gives us some excellent advice on how to guard against threats.
Definition•29 October 2024What is the FGPP, or how to apply a refined password policy?What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.
Definition•29 October 2024Dictionary attack: what if a password dictionary was the solution?A password dictionary isn't just useful for hackers. Companies can also use it to check the strength of their passwords against dictionary attacks! Find out how.
Definition•29 October 2024Shadow IT: a new threat to corporate IT security?What is shadow IT, a practice that is becoming increasingly common in companies? We take a look at the risks, opportunities and areas for improvement in shadow IT.
Tip•28 October 2024How do you set up an effective IT incident management process?Why implement an ITIL-standard incident management process, and how do you go about it? Find out in this article.
Tip•16 November 2020Everything About Corporate Data Security PolicyWhat is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.