Our Blog

How can you protect yourself from the upsurge in spearphishing?

Spearphishing is an elaborate approach which seeks to impersonate a colleague or a manager in order to obtain information or ask someone to make illegitimate transactions. These particularly insidious attacks are more difficult to identify. There are, however, good practices and tools to prevent this type of threat.

Read this article

Published on

11 September 2024

Preparing for NIS2 requirements

Through NIS2, the European regulator is requiring critical players and organisations with a systemic position to strengthen the security measures of their information systems.

Read this article

Published on

04 September 2024

Landing Zone Cloud security: Protecting your resources

According to Gartner, by 2025, the root cause of more than 99% of cloud computing breaches will be misconfiguration or end-user errors. *In our previous article on best practice for designing and managing the network within a Cloud Landing Zone, we highlighted the fundamental importance of a robust and secure network infrastructure as a cornerstone of a successful transition to the Cloud. By placing security at the heart of Cloud governance, we will explore how CIOs can realise the full potential of the Cloud, while maintaining a robust Zero Trust Approach.

Read this article

Published on

27 August 2024

Contact us

Do you have any questions about an article? Do you need help solving your IT issues? 

Contact an expert

Our experts answer your questions

Do you have any questions about an article? Do you need help solving your IT issues?