top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


WeTransfer accused of using its users' files to train an AI
➡️ Yet another example that illustrates why the governance of file sharing tools must remain in the hands of the IT department. I have always insisted: data sharing outside the company should never be done via unvalidated tools. This case is emblematic. Yes, WeTransfer claims that its AI is used solely for moderation… but the wording of their Terms of Service remains vague. And this is not the first warning: in June 2019, a security incident allowed third parties to access fi
Jul 9, 20251 min read


🔐 Cybersecurity alert for executives: 184 million passwords exposed!
Article to read: https://lnkd.in/eRuSDSt9 A massive data breach revealed by ZDNet affects Google, Microsoft, Facebook, and many other critical services. The compromised data includes real passwords, in plain text, easily exploitable by attackers. 👉 As a leader, you have two reflexes to adopt immediately: Change your passwords, especially if you reuse them on multiple services. Check if your email address has been compromised: https://haveibeenpwned.com 💡 This type of
May 31, 20251 min read


🔐 Notary offices & cybersecurity: an underestimated risk for highly sensitive data 🔐
Notary offices are prime targets for cybercriminals. And for good reason: they handle highly sensitive data daily—real estate transactions, wills, marriage contracts, company statutes, etc. Valuable information that attracts all kinds of covetous eyes. THE High Council of Notaries - Notaries of France (CSN) understands this well: it imposes a strict security framework through technical and organizational rules which, as an IT director, seem to me both coherent and neces
May 1, 20251 min read


🔒 Secure your access and strengthen your cybersecurity! 🔒
Business leaders, did you know that password management and multi-factor authentication (MFA) are essential pillars for protecting your sensitive data? In a constantly evolving digital environment, it is crucial to adopt secure practices to prevent cyberattacks and preserve the integrity of your information system. 📚 Discover my white paper: a comprehensive guide to best practices for optimal password management and multi-factor authentication. Learn how: ➡️ Create strong an
Mar 30, 20251 min read


🚨 Cybersecurity: Europe strengthens its digital sovereignty with the EUVD 🇪🇺
ENISA has launched the EUVD (European Vulnerability Database), a European database dedicated to vulnerabilities. This is an important step towards greater autonomy and responsiveness to cyber threats. 💬 My opinion: I'm following this type of development closely, especially for the systems installed at my clients' sites. Having an up-to-date European database allows me to be even more responsive in identifying and patching at-risk equipment. A real operational advantage. 🔍 A
Mar 30, 20251 min read


Why restarting your phone every day is crucial for your safety 🔐📱
Cyberattacks on smartphones are constantly increasing. A recent attack via WhatsApp allowed hackers to infiltrate devices using sophisticated spyware. This type of attack, known as a "clickless" attack, compromises a phone without the user needing to interact with a link or attachment. The threat is therefore invisible and very difficult to detect. 👉 What particularly interests me: 1️⃣ Applications like WhatsApp, often used without the knowledge of company IT departments,
Feb 17, 20251 min read


✳️ As a leader, do you think your information system is ready to pass the cyber insurers' test? ✳️
It's a fact: today, if your IT system doesn't meet strict security criteria, you could simply be deemed "uninsurable for cyber risks." This raises two crucial questions: 1️⃣ What is the maturity level of your IT security? A cyber insurance application can become an unofficial audit of your system. Insurers require robust security measures before agreeing to cover risks. If you are uninsurable, it reveals weaknesses that can expose you to enormous risks. 2️⃣ Is your company re
Feb 6, 20252 min read


🚨 Leaders, time is running out to secure your IT infrastructure! 🚨
📅 October 14, 2025: a date to mark in your calendars. On that day, Microsoft will end support for Windows 10 and certain versions of Office. What does this mean in concrete terms? 👉 More security updates. 👉 Increased risks from cyberattacks. 👉 Declining performance and reliability for your essential tools. 🔐 Windows 11: an investment in your security In addition to being more secure, Windows 11 offers better compatibility with the latest technologies. Migrating now means
Jan 24, 20251 min read


🚨 Instant transfers become free in France from today: a step forward, but beware of the risks!
Free access to instant transfers is excellent news for streamlining transactions and simplifying our daily lives. However, this ease of use can also open the door to significant risks of scams and cyberattacks. ❌ No recourse in case of fraud. Unlike traditional bank transfers, instant transfers are irreversible. Once the money is gone, it's impossible to reverse the transaction, even if you realize it was fraudulent. Scammers know this and exploit this vulnerability to act qu
Jan 2, 20251 min read


NIS2 Directive
🫸 Even in the field of cybersecurity, politics can slow down, or even hinder, regulatory progress such as the NIS2 directive. 🫷 France is struggling to transpose the European NIS2 directive into its national law, suffering a delay due to political blockages and governmental instability. This directive, although essential to strengthen the cybersecurity of companies and critical infrastructures, could affect more than 10,000 French organizations from 18 sectors of activi
Oct 10, 20241 min read
bottom of page