top of page

THE ESSENTIALS
News, analysis and advice to support your digital transformation


🚀 New year, new identity for Andiris.
For 2026, Andiris is harmonizing its image. Today we are launching our new visual identity, which will now be featured across our entire website. This new logo reaffirms our three strategic pillars (the three yellow dots): 🟡 Innovate: Modernize your tools and practices. 🟡 Transform: Drive your IT towards performance. 🟡 Secure: Guarantee the integrity of your digital assets. A cosmetic evolution that reflects our requirement: clarity, rigor and operational efficiency. 👉 Di
Jan 81 min read


✨ Leaders, as 2026 dawns, your role remains to steer your company with clarity and confidence.
In a constantly evolving digital world, technology should be a lever—not a source of stress. I wish you this year: 👉 Systems that remain reliable, data that stays protected, and teams that work with peace of mind 🛡️ 👉 Digital hygiene becoming second nature—from backups to strong authentication—so risks stay under control 🔐 👉 IT projects that support your strategic ambitions and accelerate your success 🚀 👉 Teams using the right tools, at the right time, to focus on what
Jan 41 min read


Two years of imbalance, a few minutes with AI, and everything is finally balanced ❄️✨
The living room 🔥 was OK. The upstairs too 🏠. But two rooms, at the end of the circuit ❄️, remained colder. And yes, we're talking about heating 🔥🔥🔥 Sludge removal, annual maintenance, minor adjustments… I had reached an acceptable balance. So acceptable, in fact, that faced with the complexity of the adjustments, I ended up not touching anything for two years ⏳. For fear of throwing everything off balance. I had kept a record though: a small table with the settings test
Jan 41 min read


🔎 Data Act: What CIOs really need to know
The Data Act (EU 2023/2854) fundamentally redefines data governance in Europe, particularly data from connected objects, industrial systems and associated services. 👉 For a CIO, the impacts are very concrete: • Data access by design IoT solutions must allow direct, secure and free access to the generated data, in usable formats. No more "default" technical barriers. • Extended portability and sharing Companies will be able to request the transfer of their data (personal and
Dec 27, 20251 min read


Cisco is at the forefront of security against quantum cyber threats, but not immune to vulnerabilities.
Recent events perfectly illustrate this paradox. On the one hand, the deployment in Switzerland of a "quantum-safe" network with ID Quantique demonstrates that Cisco remains a cutting-edge technology leader. On the other hand, serious warnings about sophisticated cyberattacks serve as a reminder that even the best equipment has its vulnerabilities. 🔍 My feedback: Throughout my career as an IT Director, I have often chosen to limit the number of Cisco devices within our infra
Dec 22, 20251 min read


🎄 Christmas favorite for Advertising! No AI, just pure talent!
It highlights real artists and genuine talent. A great reminder: even in the midst of digital transformation, human creativity remains irreplaceable. Kudos to Illogic Studios! https://www.youtube.com/watch?v=Na9VmMNJvsA
Dec 12, 20251 min read


The cost of under-investing in cybersecurity – €22.75 million 💰💰💰
The cost of recovery from the cyberattack on high schools in Hauts-de-France: €22.75 million 💰💰💰 Let’s be clear: which private company could absorb such an expense just to get back on its feet? ❌❌❌ None ❌❌❌ Only “Enterprise France” survives, supported by public funds. For an SME or mid-sized company, €22.75M means certain bankruptcy. Investment in preventive cybersecurity is not a cost center. It is the only insurance policy that guarantees the continuity of your business.
Dec 12, 20251 min read


The end of passwords? Not yet.
A very good reminder about cybercrime. Password management remains the foundation of digital hygiene: vault, MFA, complexity, rotation… it’s the bare minimum to limit risks. However, a recurring discourse about the “end of passwords” is emerging, driven by passkey solutions and strong authentication integrated into browsers and smartphones. The promise is appealing, but we are still far from it in businesses: heterogeneous systems, legacy applications, dependence on service p
Dec 3, 20251 min read


ANSSI and BSI publish a joint statement on the criteria for digital sovereignty of the #Cloud.
The joint publication by ANSSI and BSI reminds us of an essential point: without control of our data, there is no possible digital sovereignty. Europe cannot afford to depend on foreign infrastructure or jurisdictions to host, process or secure such sensitive information, whether it concerns businesses, citizens or public institutions. Strengthening a European offering of trusted cloud services is not just a technical challenge. It is a strategic imperative to guarantee the c
Nov 23, 20251 min read


🔴 Cloudflare outage – keep things in perspective while remaining vigilant
Cloudflare and Akamai secure and accelerate thousands of websites and services. When their networks go down, access to services is disrupted, as is the case today. But the good news is: your data remains intact. This outage serves as a reminder that even the web giants are not infallible and that redundancy and fault tolerance remain essential for any digital infrastructure. Akamai Technologies Orange Cyberdefense Cloudflare https://lnkd.in/egg6Fg64
Nov 17, 20251 min read


AWS & F5 - When giants falter
This week, two events that should give us pause for thought: ⚙️ Amazon Web Services (AWS) is experiencing a major outage in its US-East-1 region. As a result, services like Snapchat, Canva, or Capital.fr become partially or totally inaccessible. 🛡️ F5 Networks, a global cybersecurity company, has announced that it has been the victim of a sophisticated cyberattack. The intrusion is believed to be linked to a state-sponsored group. Internal data and source code have rep
Oct 23, 20252 min read


Meet Vincent Pollet - +20 years in securing, transforming and optimizing IT
👉 Leaders don't need more complexity, they need clarity and trust. For over 20 years, I have adapted to each organization and its unique challenges to deliver the best digital solutions. Confidentiality, close collaboration, and efficiency are my guiding principles. 📌 If you are a manager, this document is for you. 📌 If you know a leader who needs to regain control of their IT, consider tagging them in the comments. 🟡 GROUPEACTIVE 🟣 DSIACTIVE 🟢 DAF-ACTIVE 🩷 HR
Oct 14, 20251 min read


IT contract management: a strategic pillar of the CIO's role
For over 15 years, I have worked in tandem with a legal specialist to manage IT contracts. I also completed specialized training at Francis Lefebvre, which allowed me to deepen my understanding of the specific legal aspects of IT contracts. A good contract rests on several pillars. Fair? Yes, but that's only the foundation. IT contracts have specific characteristics that are often overlooked by lawyers: 🧠 Intellectual property: who owns what, and under what conditions. 🚫 Ev
Oct 9, 20251 min read


“Who has access to what in your company?”
This is a question I encounter very often in my work as an outsourced CIO. Behind it all, the same issues always lie: data security, regulatory compliance, and operational efficiency. I had the opportunity to share my experience in a white paper dedicated to access and password management. I offer a practical perspective: Why a centralized manager has become indispensable, and above all, what criteria should be considered to choose the right one in a business context. If this
Sep 30, 20251 min read


🚀 iOS 26 is available!
Apple has just released its new update for iPhone and iPad, with several useful improvements for the workplace: ✅ Intelligent incoming call filtering: you know who is calling and why, before you answer. ✅ Hold Assist: no more waiting indefinitely on the phone, the iPhone notifies you when an advisor is online. ✅ Real-time translation in Messages, FaceTime and Phone, convenient for international communication. ✅ Improved Concentration Mode: finer work/personal management, abil
Sep 30, 20251 min read


🚀 Onboarding: First impressions count
Like a well-designed website, welcoming a new employee makes an immediate impression. And it's crucial. 👥 People first: HR, management, managers… everyone plays a role in making the newcomer feel welcomed and guided. 💻 Next comes the operational side: access to tools, active accounts, available information… nothing is worse than starting in “access request” mode! 🤝 HR & IT collaboration: successful onboarding relies on close coordination between the HR team and the IT depa
Sep 29, 20251 min read


🚀 You've created your website using a CMS (🌐 WordPress, 🛠️ Wix, 🛍️ Shopify…) or an integrated CRM, and that's an excellent first step! 🎉
But did you know that ⚠️ 80% of security breaches and performance losses come from poor maintenance hygiene? Many leaders and entrepreneurs launch their website, then… ⏳ stop updating it. Result : ➡️ 💀 Hacking risks ➡️ 🐢 Degraded user experience (outdated plugins, slowness, bugs 🐞) ➡️ 👻 Loss of visibility (SEO penalized by Google if the site is not optimized 🔍) ➡️ 😬 Unprofessional image (outdated design = lack of credibility 🎨) Here is the essential checklist for
Sep 28, 20251 min read


🚪 Offboarding: leaving everything in order
One week after discussing onboarding, it's time to address the other side of the coin: an employee's departure. Like their arrival, this moment is critical and requires method and rigor. 💻 Disable access: From the outset, the employee should no longer have access to information systems, cloud applications, email, or VPN. Every oversight can create significant security risks. 🖥️ Equipment recovery and processing: computers, phones, badges… each piece of equipment must follow
Sep 27, 20251 min read


Electronic billing mapping
Thank you for sharing. Olivier Gervaise 🙏. Mapping the platforms is invaluable for understanding the market. But beware: the real risk for an SME/VSE is being left to make the choices and implement them alone. Don't stop at simply selecting a tool. Appropriate support is key to securing, integrating, and transforming electronic invoicing into a true performance driver. 🟣 DSIACTIVE 🟡 GROUPEACTIVE
Sep 27, 20251 min read


Apple security alert – urgent update
A zero-day vulnerability is currently being exploited on iOS, iPadOS, and macOS. It could allow attackers to compromise your devices and data. Update all your Apple devices immediately: 👉iOS 18.6.2 / iPadOS 18.6.2 👉 macOS Sequoia 15.6.1, Sonoma 14.7.8, Ventura 13.7.8 Access paths for the update: 👉 iPhone / iPad: Settings → General → Software Update 👉 Mac: Apple menu → System Preferences → Software Update For companies with mass deployment tools, now is the ideal time to u
Sep 25, 20251 min read


I have disabled the "Data for Generative AI Improvement" option on LinkedIn
Since September 18, 2025, LinkedIn has informed its European users that, starting November 3, 2025, some of their personal data and content may be used to train its generative AI models, unless they explicitly object. This policy was previously only in place for US users. I chose to disable this option to maintain control over my work data. This can be done in the Data Privacy menu, then under Data for Generative AI Improvement. 💡 A small action to protect your privacy, but
Sep 24, 20251 min read


Cybersecurity Conference - 1 year later...
📍 Spring 2024, Chantilly Golf Course . Facing an audience of executives, I began my presentation on digital transformation with a shock tactic: 💥 330,000 successful cyberattacks in France in 2022. 7% of SMEs affected… but an average cost of €130,000 to recover. An already alarming figure, but this was only the tip of the iceberg. ⏩ One year later, in 2025, the situation had worsened: 💸 €466,000: average cost for a micro-enterprise/SME after an attack. 💼 €13 million
Sep 22, 20251 min read


Capgemini acquires Cloud4C
Capgemini's acquisition of Cloud4C sends a strong signal to the managed cloud market. The challenge lies not only in strengthening technical capabilities, but above all in successfully integrating the organization and culture. My experience with international partners has shown me that when integrations are entrusted to teams in India, the methodological rigor is remarkable: precise procedures, structured execution, minimal margin of error. This is an undeniable strength. How
Sep 22, 20251 min read


Cyber attack - Land Rover Jaguar
Restarting an information system after a cyberattack is never a simple technical exercise: it is a real race against time, where every hour lost translates into financial losses, halted production and unhappy customers. The incident affecting Jaguar Land Rover today clearly illustrates this reality. Behind the headlines, IT and cybersecurity teams are working tirelessly to safely restore critical systems so that production lines can restart. The impacts are multiple: immediat
Sep 15, 20251 min read
bottom of page