Explore cybersecurity best practices

  • Consent for web cookies, should you review your usage?
    Consent for web cookies, should you review your usage?

    It is possible to use cookies while respecting privacy and therefore without requesting consent.

  • Strong authentication, constraint or benefit?
    Strong authentication, constraint or benefit?

    In 2023, strong authentication, also called modern, is established as a basic protection practice for critical accounts, but what is it, how to do it well and how does it work? Do you know the Aesop tale about the wolf and the kid goat? Having to leave her kid alone, the goat reminds him to […]

  • Protect your personal data: clean up your accounts
    Protect your personal data: clean up your accounts

    Throughout the year, we share confidential data with companies, administrations or relatives. It is a good idea to clean up once a year, to remove these documents or information from our accounts.

  • Build a resilient backup strategy
    Build a resilient backup strategy

    You are much more likely to fall victim to ransomware than experiencing physical destruction of your servers. Discover ways to adjust your backup strategies to address new threats. In addition to resilient backups, I will explain effective methods for preparing your organisation to face a major cyberattack.

  • Identify, classify and protect your critical operations and data
    Identify, classify and protect your critical operations and data

    It is not possible to protect and secure all data and systems in an organization. It would be too expensive, too time-consuming and, above all, would reduce your performance. You must balance security measures with their impact on your operations. Determine the value added, identify the flows associated with the value creation and then the level of protection required for these systems and data.

  • Having a contingency plan or be prepared?
    Having a contingency plan or be prepared?

    In risk prevention, I distinguish three levels: understanding the risk, having a plan and being prepared. Depending on the situation, you will either accept the risk or prepare to reduce it. For risks that affect your critical operations, there are no secrets, you have to be ready. I explain how to move from one level to the next.