top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation
![[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests](https://static.wixstatic.com/media/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.jpg/v1/fill/w_333,h_250,fp_0.50_0.50,q_30,blur_30,enc_avif,quality_auto/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.webp)
![[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests](https://static.wixstatic.com/media/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_avif,quality_auto/dc9514_9d47a979fc9f428ea32a4c686f906ff4~mv2.webp)
[Technical Watch] 🔒 End of SharePoint and OneDrive OTPs for guests
Microsoft is gradually phasing out external shares based on OTPs (One-Time Passcodes). Specifically: ❌ Anonymous links will no longer work 👉 External users will need to be invited as guests in Entra ID (Azure AD B2B) ⚠️ The problem: many service providers haven't anticipated this change. The result? Your external sharing could stop overnight. ✅ Immediate audit of external access ✅ Migration to Entra B2B ✅ Application of security policies (MFA, Conditional Access) 💡 Strategi
6 days ago1 min read
![[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt](https://static.wixstatic.com/media/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.webp)
![[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt](https://static.wixstatic.com/media/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/dc9514_a88c53cf91814a5680b75a3d02ed3cd2~mv2.webp)
[Cyber-vigilance]: Anatomy of a #Smishing (SMS phishing) attempt
The scenario is well-rehearsed: I receive a #SMS "From the delivery driver" informing me that a package could not be delivered. A photo of a truck full of boxes was included to support this claim for credibility. 🪝 The catch? The SMS arrives at the exact moment I receive an Amazon delivery notification. My reflex: 1️⃣ Immediate suspicion 🫥: Never click on the link in the SMS. 2️⃣ Source verification: Opening the official Amazon app. 3️⃣ Proof by image: My packag
Mar 251 min read


1.2 million bank accounts compromised at Bercy. Monitoring your accounts is no longer enough.
The ZDNet article confirms a massive vulnerability in the FICOBA database. For an executive or CIO, the usual advice ("change your passwords") represents the bare minimum level of protection. Faced with the threat of SEPA direct debit fraud, we must move from a reactive mode to a total control mode. Here are my 3 priority recommendations for securing your company's cash flow: 1️⃣ The EBICS TS (Transport and Signature) protocol: This is the "standard" for banking security. Unl
Feb 231 min read


Cybersecurity for very small and small businesses: awareness is there. Now, it's time for action.
According to the latest study published by Cybermalveillance.gouv.fr : 📊 16% of very small and small businesses have suffered a cyberattack this year. 🔍 44% feel highly exposed. 🛡️ 58% believe they are well protected (+20 points in one year). 🔐 51% have a password policy. 📲 26% use two-factor authentication. 🚨 24% have a response plan. ⚠️ 80% do not feel truly ready to face it. Thanks to Cybermalveillance.gouv.fr for this useful and factual reminder. The figures are
Feb 171 min read


SEO is good. GEO is now. 🚀
Everyone knows about SEO (Search Engine Optimization). But have you tested your GEO (Generative Engine Optimization)? 🤖 GEO is the art of optimizing your visibility not on a Google results page, but in the responses generated by AI (ChatGPT, Gemini, Perplexity). I put my structure through a crash test. The results are... instructive (and a little surprising). 📊 My current visibility score: Gemini: 13% Perplexity: 9% ChatGPT: 9% The diagnosis (thanks Gemini & Perplexity):
Feb 121 min read


Supporting managers where the IT provider stops.
Too often, information systems are perceived as a cost center or a source of complexity. At Andiris , a member of the DSIACTIVE network , we are changing this view: your IT should be an engine of growth, not a hindrance. What is the difference? Unlike a service provider, an outsourced IT department integrates with your teams and acts exclusively in the interest of your strategy. We bring the rigor, absolute confidentiality and expertise necessary to secure your data and o
Jan 91 min read


Cisco is at the forefront of security against quantum cyber threats, but not immune to vulnerabilities.
Recent events perfectly illustrate this paradox. On the one hand, the deployment in Switzerland of a "quantum-safe" network with ID Quantique demonstrates that Cisco remains a cutting-edge technology leader. On the other hand, serious warnings about sophisticated cyberattacks serve as a reminder that even the best equipment has its vulnerabilities. 🔍 My feedback: Throughout my career as an IT Director, I have often chosen to limit the number of Cisco devices within our infra
Dec 22, 20251 min read


AWS & F5 - When giants falter
This week, two events that should give us pause for thought: ⚙️ Amazon Web Services (AWS) is experiencing a major outage in its US-East-1 region. As a result, services like Snapchat, Canva, or Capital.fr become partially or totally inaccessible. 🛡️ F5 Networks, a global cybersecurity company, has announced that it has been the victim of a sophisticated cyberattack. The intrusion is believed to be linked to a state-sponsored group. Internal data and source code have rep
Oct 23, 20252 min read


IT contract management: a strategic pillar of the CIO's role
For over 15 years, I have worked in tandem with a legal specialist to manage IT contracts. I also completed specialized training at Francis Lefebvre, which allowed me to deepen my understanding of the specific legal aspects of IT contracts. A good contract rests on several pillars. Fair? Yes, but that's only the foundation. IT contracts have specific characteristics that are often overlooked by lawyers: 🧠 Intellectual property: who owns what, and under what conditions. 🚫 Ev
Oct 9, 20251 min read


“Who has access to what in your company?”
This is a question I encounter very often in my work as an outsourced CIO. Behind it all, the same issues always lie: data security, regulatory compliance, and operational efficiency. I had the opportunity to share my experience in a white paper dedicated to access and password management. I offer a practical perspective: Why a centralized manager has become indispensable, and above all, what criteria should be considered to choose the right one in a business context. If this
Sep 30, 20251 min read


🚀 Onboarding: First impressions count
Like a well-designed website, welcoming a new employee makes an immediate impression. And it's crucial. 👥 People first: HR, management, managers… everyone plays a role in making the newcomer feel welcomed and guided. 💻 Next comes the operational side: access to tools, active accounts, available information… nothing is worse than starting in “access request” mode! 🤝 HR & IT collaboration: successful onboarding relies on close coordination between the HR team and the IT depa
Sep 29, 20251 min read


🚪 Offboarding: leaving everything in order
One week after discussing onboarding, it's time to address the other side of the coin: an employee's departure. Like their arrival, this moment is critical and requires method and rigor. 💻 Disable access: From the outset, the employee should no longer have access to information systems, cloud applications, email, or VPN. Every oversight can create significant security risks. 🖥️ Equipment recovery and processing: computers, phones, badges… each piece of equipment must follow
Sep 27, 20251 min read


Cybersecurity Conference - 1 year later...
📍 Spring 2024, Chantilly Golf Course . Facing an audience of executives, I began my presentation on digital transformation with a shock tactic: 💥 330,000 successful cyberattacks in France in 2022. 7% of SMEs affected… but an average cost of €130,000 to recover. An already alarming figure, but this was only the tip of the iceberg. ⏩ One year later, in 2025, the situation had worsened: 💸 €466,000: average cost for a micro-enterprise/SME after an attack. 💼 €13 million
Sep 22, 20251 min read


🔐 Google recommends changing your password immediately… and I did!
I don't have a Gmail account, but for my personal Google account, I took this precaution and changed my password as soon as the alert was issued. Thanks to unique passwords for each of my sites, managed via a password manager, and two-factor authentication, the incident was quickly closed. Even for an expert, cybersecurity starts with simple but essential actions. #Cybersecurity #PasswordManagement #CIO #DigitalTransformation #ComputerSecurity https://lnkd.in/eVPn
Sep 11, 20251 min read


An outsourced CIO who acts like a member of the team… and a trusted partner 🤝
When I get involved in a company, I don't stay on the sidelines. I sit down at the table, immerse myself in the culture, and act as if I were a full-fledged member of the team 🤝 Trust is at the heart of this approach. Because on a daily basis, I have access to what the company holds most sensitive: its data, its strategic projects, its vision. Without confidentiality and loyalty, it's impossible to build a strong and lasting collaboration 🔒✨ And this logic also extends to m
Sep 1, 20251 min read


A modern vision of law, supported by a top-notch information system.
Proud to support the digital transformation of an outsourced CIO Quantor Avocats - Notaires , this new structure born from the alliance between D&V Avocats and notaries committed to innovation. Bringing lawyers and notaries together in a single structure is already a revolution in the legal approach. Their ambition: to offer integrated, seamless, and strategic support to both businesses and individuals. It is a privilege to lead the modernization of their information syst
Jul 2, 20252 min read


Thank you to Parnasse for the invitation to the VivaTech 2025 trade show!
A dazzling edition, in every sense of the word — with spectacular immersive installations, humanoids that interact live, and robots on spherical wheels that captivate the crowds. 🌈🤖⚡️ 🧠 What I saw wasn't just technical demonstrators. It highlighted applied artificial intelligence, evolving robotics, and above all, their practical usefulness in our daily lives. What was a prototype five years ago is now a business solution. 🦊 Special mention to the orange robot with a fox
Jun 13, 20252 min read


🚀 Proud to share this wonderful recognition from Microsoft! 🚀
As an expert at 🟣 DSIACTIVE , a brand of 🟡 GROUPEACTIVE , it's a real pleasure to see our close collaboration with Microsoft highlighted in this official article. Thanks to optimized integration into hashtag#MicrosoftTeams , #GAIA (Groupe Active Intelligence Artificielle) leverages AI, and more specifically intelligent agents, to simplify prospecting work. This success demonstrates the digital expertise we bring to our work every day, and the impor
Jun 12, 20251 min read


🔒 Secure your access and strengthen your cybersecurity! 🔒
Business leaders, did you know that password management and multi-factor authentication (MFA) are essential pillars for protecting your sensitive data? In a constantly evolving digital environment, it is crucial to adopt secure practices to prevent cyberattacks and preserve the integrity of your information system. 📚 Discover my white paper: a comprehensive guide to best practices for optimal password management and multi-factor authentication. Learn how: ➡️ Create strong an
Mar 30, 20251 min read


🚨 Cybersecurity: Europe strengthens its digital sovereignty with the EUVD 🇪🇺
ENISA has launched the EUVD (European Vulnerability Database), a European database dedicated to vulnerabilities. This is an important step towards greater autonomy and responsiveness to cyber threats. 💬 My opinion: I'm following this type of development closely, especially for the systems installed at my clients' sites. Having an up-to-date European database allows me to be even more responsive in identifying and patching at-risk equipment. A real operational advantage. 🔍 A
Mar 30, 20251 min read
bottom of page