How to Assess the Credibility of a Security Certification?
To prove their dependability, IT solutions may acquire a security certification. This becomes a significant advantage in the IT market, especially in an era where cybersecurity is a key concern for organizations. However, how can one ensure the credibility of a...
Cyberspace: European companies faced with international cyber espionage
Cyber espionage attacks by state or para-state entities are on the increase, targeting European companies. They mainly target organisations that are essential to a country's functioning or economy. Consequences of geopolitical instabilities An upsurge in state and...
“Bossware”: what is this software that spies on employees?
Bossware makes it possible to monitor an employee's activity remotely. The use of spyware is more widespread than you might think, especially since the advent of teleworking and AI. How can they be detected and what are the risks? What is bossware? Definition and...
Finance: how to prepare for the application of DORA regulations?
Complementing the NIS2 directive, the DORA (Digital Operational Resilience Act) regulation adds another layer of cybersecurity to the financial sector. To protect their assets and the economic interests of European nations, financial institutions must strengthen their...
OES and OIV: what is the impact of the NIS2 directive?
With the forthcoming application of the NIS 2 Directive in Europe, essential service operator (OES) and operator of vital importance (OIV) are preparing for new obligations to strengthen their cybersecurity. A new name for essential service operator (OES) The creation...
The NIS2 directive: what changes for European businesses and administrations?
These European-wide cybersecurity regulations are unprecedented. There are many requirements to ensure that European organisations can demonstrate a common high level of IT security. Companies will have to comply, and quickly. Here are the main changes in the new NIS2...
How do you raise employee awareness of cybersecurity?
Spearphishing, ransomware, downloading malicious software... These cybersecurity threats affect employees in all businesses, particularly those working from home. Raising awareness of cyber security is now essential. Economic and political risks Cyber attacks on...
5 tips to secure teleworking from Julien, System and Security Admin at Tixeo
Businesses are facing ever-greater cyber threats, and teleworking is exacerbating these risks. Julien, System and Security Administrator at Tixeo, gives us his advice on how to make teleworking (and teleworkers!) more secure. Why do companies need to improve...
How can we reinvent and secure remote working in 2023?
Remote working is now a popular option for many employees and companies. But at a time when cyberthreats are on the increase, how can teleworking be made truly effective and its security strengthened within organisations? Quiet quitting, digital nomads... A new vision...
Teleworking: 3 ways to improve productivity
Today, a large majority of French people believe that teleworking has more advantages than disadvantages. In fact, 72% believe that the main advantage of teleworking is increased individual productivity. These are the findings of a recent study by SD Worx. Why...
QWL: how do you break the isolation of teleworking?
Whether imposed or flexible, teleworking can be a difficult experience for employees. Teleworkers may feel isolated from their colleagues and superiors. This major risk has consequences for employees' well-being and commitment to the company. Facilitating...
How to avoid “zoombombing” during an online meeting?
"Zoombombing" in video conferencing is still going strong. It disrupts increasingly strategic online meetings, often with malicious intent. To avoid this, video conferencing security must be maximised at all levels. What is "zoombombing" in online meeting?...