top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


Outsourcing is often misunderstood.
It is associated with cost reduction, when it is primarily a matter of managerial clarity. In this intervention of Frédéric Barbier on BSMART 4Change , one point seems central to me: 👉 outsourcing is not delegating blindly, it is giving yourself the means to act faster and better, with immediately operational skills. In the field of very small and small businesses, I see it every week as an outsourced CIO at 🟣 DSIACTIVE : The leader rarely lacks vision. It mai
Jan 271 min read


The generalization of the MFA to the Ministry of the Interior is essential. But at this scale, this type of project inevitably takes a long time.
And that is precisely where the subject becomes strategic. When an MFA deployment takes months, or even longer, the real question is no longer just how to secure it today, but what that security will be worth at the end of the project. Attackers, however, don't wait. MFA fatigue, targeted phishing, session hijacking: MFA is no longer an end in itself. In such a critical ministry, the approach must be visionary: to think now about the post-MFA era — authentication without pass
Jan 201 min read


Supporting managers where the IT provider stops.
Too often, information systems are perceived as a cost center or a source of complexity. At Andiris , a member of the DSIACTIVE network , we are changing this view: your IT should be an engine of growth, not a hindrance. What is the difference? Unlike a service provider, an outsourced IT department integrates with your teams and acts exclusively in the interest of your strategy. We bring the rigor, absolute confidentiality and expertise necessary to secure your data and o
Jan 91 min read


🚀 New year, new identity for Andiris.
For 2026, Andiris is harmonizing its image. Today we are launching our new visual identity, which will now be featured across our entire website. This new logo reaffirms our three strategic pillars (the three yellow dots): 🟡 Innovate: Modernize your tools and practices. 🟡 Transform: Drive your IT towards performance. 🟡 Secure: Guarantee the integrity of your digital assets. A cosmetic evolution that reflects our requirement: clarity, rigor and operational efficiency. 👉 Di
Jan 81 min read


Cisco is at the forefront of security against quantum cyber threats, but not immune to vulnerabilities.
Recent events perfectly illustrate this paradox. On the one hand, the deployment in Switzerland of a "quantum-safe" network with ID Quantique demonstrates that Cisco remains a cutting-edge technology leader. On the other hand, serious warnings about sophisticated cyberattacks serve as a reminder that even the best equipment has its vulnerabilities. 🔍 My feedback: Throughout my career as an IT Director, I have often chosen to limit the number of Cisco devices within our infra
Dec 22, 20251 min read


The cost of under-investing in cybersecurity – €22.75 million 💰💰💰
The cost of recovery from the cyberattack on high schools in Hauts-de-France: €22.75 million 💰💰💰 Let’s be clear: which private company could absorb such an expense just to get back on its feet? ❌❌❌ None ❌❌❌ Only “Enterprise France” survives, supported by public funds. For an SME or mid-sized company, €22.75M means certain bankruptcy. Investment in preventive cybersecurity is not a cost center. It is the only insurance policy that guarantees the continuity of your business.
Dec 12, 20251 min read


AWS & F5 - When giants falter
This week, two events that should give us pause for thought: ⚙️ Amazon Web Services (AWS) is experiencing a major outage in its US-East-1 region. As a result, services like Snapchat, Canva, or Capital.fr become partially or totally inaccessible. 🛡️ F5 Networks, a global cybersecurity company, has announced that it has been the victim of a sophisticated cyberattack. The intrusion is believed to be linked to a state-sponsored group. Internal data and source code have rep
Oct 22, 20252 min read


“Who has access to what in your company?”
This is a question I encounter very often in my work as an outsourced CIO. Behind it all, the same issues always lie: data security, regulatory compliance, and operational efficiency. I had the opportunity to share my experience in a white paper dedicated to access and password management. I offer a practical perspective: Why a centralized manager has become indispensable, and above all, what criteria should be considered to choose the right one in a business context. If this
Sep 29, 20251 min read


🚀 You've created your website using a CMS (🌐 WordPress, 🛠️ Wix, 🛍️ Shopify…) or an integrated CRM, and that's an excellent first step! 🎉
But did you know that ⚠️ 80% of security breaches and performance losses come from poor maintenance hygiene? Many leaders and entrepreneurs launch their website, then… ⏳ stop updating it. Result : ➡️ 💀 Hacking risks ➡️ 🐢 Degraded user experience (outdated plugins, slowness, bugs 🐞) ➡️ 👻 Loss of visibility (SEO penalized by Google if the site is not optimized 🔍) ➡️ 😬 Unprofessional image (outdated design = lack of credibility 🎨) Here is the essential checklist for
Sep 27, 20251 min read


Apple security alert – urgent update
A zero-day vulnerability is currently being exploited on iOS, iPadOS, and macOS. It could allow attackers to compromise your devices and data. Update all your Apple devices immediately: 👉iOS 18.6.2 / iPadOS 18.6.2 👉 macOS Sequoia 15.6.1, Sonoma 14.7.8, Ventura 13.7.8 Access paths for the update: 👉 iPhone / iPad: Settings → General → Software Update 👉 Mac: Apple menu → System Preferences → Software Update For companies with mass deployment tools, now is the ideal time to u
Sep 24, 20251 min read


Cybersecurity Conference - 1 year later...
📍 Spring 2024, Chantilly Golf Course . Facing an audience of executives, I began my presentation on digital transformation with a shock tactic: 💥 330,000 successful cyberattacks in France in 2022. 7% of SMEs affected… but an average cost of €130,000 to recover. An already alarming figure, but this was only the tip of the iceberg. ⏩ One year later, in 2025, the situation had worsened: 💸 €466,000: average cost for a micro-enterprise/SME after an attack. 💼 €13 million
Sep 21, 20251 min read


🔐 Google recommends changing your password immediately… and I did!
I don't have a Gmail account, but for my personal Google account, I took this precaution and changed my password as soon as the alert was issued. Thanks to unique passwords for each of my sites, managed via a password manager, and two-factor authentication, the incident was quickly closed. Even for an expert, cybersecurity starts with simple but essential actions. #Cybersecurity #PasswordManagement #CIO #DigitalTransformation #ComputerSecurity https://lnkd.in/eVPn
Sep 10, 20251 min read


Microsoft admits: "I cannot guarantee that European 🇪🇺 data will never be transferred to the U.S. government 🇺🇸."
During a Senate hearing, Anton CARNIAUX, Legal Director of Microsoft France, acknowledged a reality often downplayed: the Cloud Act applies even to data hosted in European datacenters . 👉 If the parent company is American, U.S. law prevails . ⚖️ Why this matters:The Cloud Act allows U.S. authorities to request data held by any American provider, even if stored outside the United States . ✅ Practical solutions, even for SMEs: 🔹 Data Privacy Framework (DPF) (since 2023) gove
Jul 24, 20251 min read


WeTransfer accused of using its users' files to train an AI
➡️ Yet another example that illustrates why the governance of file sharing tools must remain in the hands of the IT department. I have always insisted: data sharing outside the company should never be done via unvalidated tools. This case is emblematic. Yes, WeTransfer claims that its AI is used solely for moderation… but the wording of their Terms of Service remains vague. And this is not the first warning: in June 2019, a security incident allowed third parties to access fi
Jul 8, 20251 min read


🔐 Cybersecurity alert for executives: 184 million passwords exposed!
Article to read: https://lnkd.in/eRuSDSt9 A massive data breach revealed by ZDNet affects Google, Microsoft, Facebook, and many other critical services. The compromised data includes real passwords, in plain text, easily exploitable by attackers. 👉 As a leader, you have two reflexes to adopt immediately: Change your passwords, especially if you reuse them on multiple services. Check if your email address has been compromised: https://haveibeenpwned.com 💡 This type of
May 30, 20251 min read


🔐 Notary offices & cybersecurity: an underestimated risk for highly sensitive data 🔐
Notary offices are prime targets for cybercriminals. And for good reason: they handle highly sensitive data daily—real estate transactions, wills, marriage contracts, company statutes, etc. Valuable information that attracts all kinds of covetous eyes. THE High Council of Notaries - Notaries of France (CSN) understands this well: it imposes a strict security framework through technical and organizational rules which, as an IT director, seem to me both coherent and neces
Apr 30, 20251 min read


🔒 Secure your access and strengthen your cybersecurity! 🔒
Business leaders, did you know that password management and multi-factor authentication (MFA) are essential pillars for protecting your sensitive data? In a constantly evolving digital environment, it is crucial to adopt secure practices to prevent cyberattacks and preserve the integrity of your information system. 📚 Discover my white paper: a comprehensive guide to best practices for optimal password management and multi-factor authentication. Learn how: ➡️ Create strong an
Mar 30, 20251 min read


🚨 Cybersecurity: Europe strengthens its digital sovereignty with the EUVD 🇪🇺
ENISA has launched the EUVD (European Vulnerability Database), a European database dedicated to vulnerabilities. This is an important step towards greater autonomy and responsiveness to cyber threats. 💬 My opinion: I'm following this type of development closely, especially for the systems installed at my clients' sites. Having an up-to-date European database allows me to be even more responsive in identifying and patching at-risk equipment. A real operational advantage. 🔍 A
Mar 30, 20251 min read


Why restarting your phone every day is crucial for your safety 🔐📱
Cyberattacks on smartphones are constantly increasing. A recent attack via WhatsApp allowed hackers to infiltrate devices using sophisticated spyware. This type of attack, known as a "clickless" attack, compromises a phone without the user needing to interact with a link or attachment. The threat is therefore invisible and very difficult to detect. 👉 What particularly interests me: 1️⃣ Applications like WhatsApp, often used without the knowledge of company IT departments,
Feb 17, 20251 min read


✳️ As a leader, do you think your information system is ready to pass the cyber insurers' test? ✳️
It's a fact: today, if your IT system doesn't meet strict security criteria, you could simply be deemed "uninsurable for cyber risks." This raises two crucial questions: 1️⃣ What is the maturity level of your IT security? A cyber insurance application can become an unofficial audit of your system. Insurers require robust security measures before agreeing to cover risks. If you are uninsurable, it reveals weaknesses that can expose you to enormous risks. 2️⃣ Is your company re
Feb 6, 20252 min read
bottom of page