Latest articles

Cybercrime: examples and measures to protect sensitive projects

Tip • October 29, 2024

Cybercrime: examples and measures to protect sensitive projects

Lionel Roux, CEO of Wimi, makes us aware of the dangers lurking in IT security, and gives us some excellent advice on how to guard against threats.

What is FGPP, or how to apply a refined password policy?

Definition • October 29, 2024

What is FGPP, or how to apply a refined password policy?

What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.

Dictionary attack: what if a password dictionary was the solution?

Definition • October 29, 2024

Dictionary attack: what if a password dictionary was the solution?

A password dictionary isn't just useful for hackers. Companies can also use them to check the strength of their passwords against dictionary attacks! Find out how.

Shadow IT: a new threat to corporate IT security?

Definition • October 29, 2024

Shadow IT: a new threat to corporate IT security?

What is shadow IT, a practice increasingly encountered in the enterprise? We take a look at the risks, opportunities and ways forward for shadow IT.

How do you set up an effective IT incident management process?

Tip • October 28, 2024

How do you set up an effective IT incident management process?

Why implement an ITIL-standardized incident management process, and how do you go about it? Find out in this article.

Everything about Corporate Data Security Policy and Procedures

Tip • November 16, 2020

Everything about Corporate Data Security Policy and Procedures

What is data security policy and why is it so important? Here are the main elements to include in a data security policy and other details.