Explore cybersecurity best practices

  • Protect your personal data: clean up your accounts
    Protect your personal data: clean up your accounts

    Throughout the year, we share confidential data with companies, administrations or relatives. It is a good idea to clean up once a year, to remove these documents or information from our accounts.

  • Build a resilient backup strategy
    Build a resilient backup strategy

    You are much more likely to fall victim to ransomware than experiencing physical destruction of your servers. Discover ways to adjust your backup strategies to address new threats. In addition to resilient backups, I will explain effective methods for preparing your organisation to face a major cyberattack.

  • Identify, classify and protect your critical operations and data
    Identify, classify and protect your critical operations and data

    It is not possible to protect and secure all data and systems in an organization. It would be too expensive, too time-consuming and, above all, would reduce your performance. You must balance security measures with their impact on your operations. Determine the value added, identify the flows associated with the value creation and then the level of protection required for these systems and data.

  • Having a contingency plan or be prepared?
    Having a contingency plan or be prepared?

    In risk prevention, I distinguish three levels: understanding the risk, having a plan and being prepared. Depending on the situation, you will either accept the risk or prepare to reduce it. For risks that affect your critical operations, there are no secrets, you have to be ready. I explain how to move from one level to the next.

  • What would you do if your smartphone was lost or stolen?
    What would you do if your smartphone was lost or stolen?

    We have all become dependent on our smartphones. They perform several essential functions in everyday life: security, travel, communication, payment. If one morning your phone fails to start, is stolen, or mysteriously disappears, what would you do? I will guide you through 4 steps and 5 key actions to ensure that you are fully prepared.

  • Create a simple and pragmatic continuity plan
    Create a simple and pragmatic continuity plan

    Considering the risks of IT disasters, outages, and cyber attacks, you must be prepared. There are many acronyms to describe the contents of a Business Continuity Plan (BCP). Knowing where to start and what type of continuity plan will work best for you is essential.