Latest articles

How can you protect your business from cryptoviruses?

Tip • November 13, 2024

How can you protect your business from cryptoviruses?

Cryptoviruses are malicious software programs. Increasingly frequent, they require upstream intervention to limit the damage.

Understand the concept of cybersecurity to (better) protect your business

Word from the expert • October 29, 2024

Understand the concept of cybersecurity to (better) protect your business

Among all the sensitive subjects linked to the development of digital technology in the workplace, there is one that worries us more than any other: cybersecurity. Here's how it works.

How can DMARC authenticate your e-mails?

Definition • October 29, 2024

How can DMARC authenticate your e-mails?

5 letters for 2 main issues: less spam and more deliverability for your e-mails. Authenticate your e-mails, improve your reputation and stand out from the crowd!

Cybercrime: examples and measures to protect sensitive projects

Tip • October 29, 2024

Cybercrime: examples and measures to protect sensitive projects

Lionel Roux, CEO of Wimi, makes us aware of the dangers lurking in IT security, and gives us some excellent advice on how to guard against threats.

What is FGPP, or how to apply a refined password policy?

Definition • October 29, 2024

What is FGPP, or how to apply a refined password policy?

What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.

Dictionary attack: what if a password dictionary was the solution?

Definition • October 29, 2024

Dictionary attack: what if a password dictionary was the solution?

A password dictionary isn't just useful for hackers. Companies can also use them to check the strength of their passwords against dictionary attacks! Find out how.