top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


PAD Paris Art & Design
Thank you to Parnassus Thank you for the invitation last night to PAD Paris in the Tuileries Garden. 🖼️ A true benchmark in design and decorative arts, this fair remains an unmissable event to discover exceptional pieces, from historical furniture to contemporary creations. A beautiful immersion in aesthetics and innovation. #PADParis #Design #Art #Paris
1 day ago1 min read


LinkedIn has killed the "Like" button (and that's great news). 📉
The algorithm LinkedIn The April 2026 announcement has just confirmed what we, data experts, suspected: noise alone is no longer enough. LinkedIn has merged its systems to move to the 360Brew model. ☕️ In practical terms? AI no longer counts your clicks, it reads your expertise. 🧠 If you want to remain visible as a leader or expert this year, here are the 3 pillars: 1️⃣ The 15-15-15 Rule 📊 A "Great Post" is no longer measured by likes. What matters today: 👉 Saves: Th
1 day ago1 min read
![[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests](https://static.wixstatic.com/media/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.webp)
![[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests](https://static.wixstatic.com/media/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.jpg/v1/fill/w_376,h_282,fp_0.50_0.50,q_90,enc_avif,quality_auto/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.webp)
[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests
Microsoft is gradually phasing out external shares based on OTPs (One-Time Passcodes). Specifically: ❌ Anonymous links will no longer work 👉 External users will need to be invited as guests in Entra ID (Azure AD B2B) ⚠️ The problem: many service providers haven't anticipated this change. The result? Your external sharing could stop overnight. ✅ Immediate audit of external access ✅ Migration to Entra B2B ✅ Application of security policies (MFA, Conditional Access) 💡 Strategi
Apr 11 min read
![[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt](https://static.wixstatic.com/media/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.webp)
![[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt](https://static.wixstatic.com/media/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.png/v1/fill/w_376,h_282,fp_0.50_0.50,q_95,enc_avif,quality_auto/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.webp)
[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt
The scenario is well-rehearsed: I receive a #SMS "From the delivery driver" informing me that a package could not be delivered. A photo of a truck full of boxes was included to support this claim for credibility. 🪝 The catch? The SMS arrives at the exact moment I receive an Amazon delivery notification. My reflex: 1️⃣ Immediate suspicion 🫥: Never click on the link in the SMS. 2️⃣ Source verification: Opening the official Amazon app. 3️⃣ Proof by image: My packag
Mar 251 min read


⚠️ Security Alert: Your outdated iPhones are now hackable by anyone.
The BFMTV article confirms the release of Dark Sword, a tool that makes iOS hacking accessible without any technical expertise. The message is clear: update all your equipment (mobiles, servers and workstations) immediately. An unpatched endpoint is an open backdoor into your entire enterprise infrastructure. My approach: Faced with the democratization of these threats, my role as an external CIO is to structure your defense: 👉 Audit & Hygiene: Proactive identification of we
Mar 251 min read
![[EVENT] Cybersecurity at the service of leaders in the Chantilly area 🛡️](https://static.wixstatic.com/media/dc9514_26380fdd44bb486488da0082a6b6c2e9~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/dc9514_26380fdd44bb486488da0082a6b6c2e9~mv2.webp)
![[EVENT] Cybersecurity at the service of leaders in the Chantilly area 🛡️](https://static.wixstatic.com/media/dc9514_26380fdd44bb486488da0082a6b6c2e9~mv2.png/v1/fill/w_376,h_282,fp_0.50_0.50,q_95,enc_avif,quality_auto/dc9514_26380fdd44bb486488da0082a6b6c2e9~mv2.webp)
[EVENT] Cybersecurity at the service of leaders in the Chantilly area 🛡️
Running a very small business or a small to medium-sized enterprise (SME) means constantly balancing priorities. However, digital security should no longer be a variable to be adjusted: it is the foundation of your business continuity. I am pleased to be leading a training session for executives, organized by the Community of Communes of the Cantilienne Area . The goal is clear: 0️⃣% jargon, 💯% operational. Together, we will address the critical points to protect your st
Mar 251 min read


"Is my system 100% secure?" This is the question every executive asks their CIO.
The answer is simple: "Are you 100% sure that you (or one of your colleagues) will never click on a fraudulent link?" Every day, 2 billion fraudulent emails are sent worldwide. Technology filters the vast majority, but zero risk does not exist. The attacker is no longer trying to force your reinforced door; he is waiting to be opened from the inside. Cybersecurity is not just a collection of software. It's a chain of vigilance where humans are the first line of defense... or
Mar 121 min read


The day everything stopped
On December 7, 2023, with a single click, 350,000 businesses ceased to exist digitally. 💥 Imagine this. You're an executive at Coaxis. One ordinary morning, the screen freezes. A message appears: your data is encrypted. A ransom of $5 million is demanded. This is the starting point of "Don't Go To The Police," the gripping film screened yesterday at the Grand Rex, which I had the pleasure of attending thanks to the Circle. Parnassus . This isn't a movie. It's a true stor
Mar 121 min read


Whatsapp - Professional Life / Personal Life Confusion & Shadow IT
A very interesting analysis by Agathe SIDER from a legal standpoint. But this decision also raises a question that CIOs encounter every day: Shadow IT. When professional exchanges take place on WhatsApp, outside of company-approved tools, several risks arise: 🔐 Circulation of professional data outside the information system 📂 Lack of archiving and traceability of exchanges 🌍 No control over data location and sovereignty And in practice, these groups are often created w
Mar 121 min read


🚨 Gemini: the price of the "complete" experience
Google added this banner: "Human reviewers read some discussions to improve the AI. To prevent your future discussions from being read, disable Activity." 🔹 What this means in practice: If you activate the activity, everything you type can be examined by humans to train Gemini. You retain your conversation history and benefit from personalized suggestions. 🔹 If you disable the activity: No more human review = more privacy. But you lose the history, personalized suggestions,
Feb 231 min read


🔎 ZOOM: EBICS TS
EBICS (Electronic Banking Internet Communication Standard) is the protocol used by companies to transmit their payment files to their bank: transfers, direct debits, remittances. This is the official channel between your ERP and your bank. 🏦 But there are several levels of security. The majority of companies use EBICS T: The transport is secure, but the validation relies primarily on the station sending the file. EBICS TS (Transport + Signature) adds a decisive layer 🔐: The
Feb 231 min read


1.2 million bank accounts compromised at Bercy. Monitoring your accounts is no longer enough.
The ZDNet article confirms a massive vulnerability in the FICOBA database. For an executive or CIO, the usual advice ("change your passwords") represents the bare minimum level of protection. Faced with the threat of SEPA direct debit fraud, we must move from a reactive mode to a total control mode. Here are my 3 priority recommendations for securing your company's cash flow: 1️⃣ The EBICS TS (Transport and Signature) protocol: This is the "standard" for banking security. Unl
Feb 231 min read


Cybersecurity for very small and small businesses: awareness is there. Now, it's time for action.
According to the latest study published by Cybermalveillance.gouv.fr : 📊 16% of very small and small businesses have suffered a cyberattack this year. 🔍 44% feel highly exposed. 🛡️ 58% believe they are well protected (+20 points in one year). 🔐 51% have a password policy. 📲 26% use two-factor authentication. 🚨 24% have a response plan. ⚠️ 80% do not feel truly ready to face it. Thanks to Cybermalveillance.gouv.fr for this useful and factual reminder. The figures are
Feb 171 min read


SEO is good. GEO is now. 🚀
Everyone knows about SEO (Search Engine Optimization). But have you tested your GEO (Generative Engine Optimization)? 🤖 GEO is the art of optimizing your visibility not on a Google results page, but in the responses generated by AI (ChatGPT, Gemini, Perplexity). I put my structure through a crash test. The results are... instructive (and a little surprising). 📊 My current visibility score: Gemini: 13% Perplexity: 9% ChatGPT: 9% The diagnosis (thanks Gemini & Perplexity):
Feb 121 min read


Attention to detail: between heritage and networking.
A wonderful immersion last night in the legendary Studio STUDIO HARCOURT PARIS , invited by the Circle Parnassus . Networking takes on a whole new dimension when it takes place amidst iconic portraits that have shaped the history of cinema and the arts. A premium experience, true to Parnasse's high standards. From the preparation (including makeup to tame the chiaroscuro lighting) to the final result, this famous black and white portrait, behind every Harcourt photo
Feb 121 min read


🚫 Do not confuse IT service providers with IT management: outsourcing IT is not the same as managing IT...
Andiris transforms complexity into clarity, technology into performance, and data into value. Unlike an IT service provider, an IT department like ours is part of your team and acts in the exclusive interest of your company. We guide your most sensitive digital choices with an approach based on three pillars: security, confidentiality and operational efficiency. Every action is aimed at protecting your data, ensuring the reliability of your systems and freeing your organisati
Feb 41 min read


Outsourcing is often misunderstood.
It is associated with cost reduction, when it is primarily a matter of managerial clarity. In this intervention of Frédéric Barbier on BSMART 4Change , one point seems central to me: 👉 outsourcing is not delegating blindly, it is giving yourself the means to act faster and better, with immediately operational skills. In the field of very small and small businesses, I see it every week as an outsourced CIO at 🟣 DSIACTIVE : The leader rarely lacks vision. It mai
Jan 271 min read


Yesterday, I had the honor of being invited by François DELASSUS to his swearing-in ceremony as a notary.
This invitation is a testament to the trust shown, for which I sincerely thank you. Partner and client through At Quantor Avocats - Notaires , François embodies values of rigor and high standards that I particularly appreciate in our professional exchanges. I wish him every success in this new chapter.
Jan 271 min read


GLPI11: Open-source ITSM that's shaking up the market 🚀
Three months after its release, GLPI 11 confirms its rise to power against proprietary solutions like ServiceNow or Jira Service Management, by focusing on flexibility, integration and transparency. What really changes: Custom assets: model all types of assets, not just IT Redesigned self-service portal + integrated forms to improve user experience Webhooks & OAuth2 API to automate and connect GLPI to other tools Enhanced security with two-factor authentication 💡 Why does th
Jan 221 min read


The generalization of the MFA to the Ministry of the Interior is essential. But at this scale, this type of project inevitably takes a long time.
And that is precisely where the subject becomes strategic. When an MFA deployment takes months, or even longer, the real question is no longer just how to secure it today, but what that security will be worth at the end of the project. Attackers, however, don't wait. MFA fatigue, targeted phishing, session hijacking: MFA is no longer an end in itself. In such a critical ministry, the approach must be visionary: to think now about the post-MFA era — authentication without pass
Jan 201 min read


Faced with increasingly demanding buyers, IT transparency has become a key factor in building trust during a sale. 🤝
During due diligence, cybersecurity vulnerabilities are no longer mere technical details: they are significant and immediate bargaining chips. For an executive, a "black box" infrastructure represents a major financial risk in negotiations. To address this, Andiris is strengthening its 360° Sale Audit by leveraging the expertise of Iparcus , penetration testing specialists. 🛡️ 🎯 Objectives: 🔍 Secure critical points before the buyer's audit 🏗️ Provide concrete eviden
Jan 131 min read


🛒 Sales & online sites: stay vigilant
Yesterday, my daughter wanted to buy something from a .eu website, which was very well rated… and very similar to a well-known .nl website. Digging a little deeper (verified external reviews), the reality was less flattering: complicated returns, non-existent customer service. Result: purchase avoided. Cybersecurity starts here: learning to step back from desire and emotion, especially among younger people. Check, compare, doubt… before clicking. Cybermalveillance.gouv.fr
Jan 131 min read


Supporting growth through shared expertise 🚀
This is precisely the ambition pursued by Frédéric LIOTARD , founder of 🟡 GROUPEACTIVE , which has been structuring this model for 30 years. Under the impetus of Frédéric Barbier , we continue to prove that access to high-level skills (Sales Management, HR, Purchasing, and of course IT) is the engine of resilience and innovation. As a member of 🟣 DSIACTIVE , my mission is clear: ✅ Secure your digital assets. ✅ Optimize your information systems. ✅ Manag
Jan 121 min read


Supporting managers where the IT provider stops.
Too often, information systems are perceived as a cost center or a source of complexity. At Andiris , a member of the DSIACTIVE network , we are changing this view: your IT should be an engine of growth, not a hindrance. What is the difference? Unlike a service provider, an outsourced IT department integrates with your teams and acts exclusively in the interest of your strategy. We bring the rigor, absolute confidentiality and expertise necessary to secure your data and o
Jan 91 min read
bottom of page