The cybersecurity of remote work outside.
After seeing how to secure your remote work at home, we will now talk about mobility situations: working remotely outside. Laptops are blossoming on café terraces and it is pleasant to answer a few emails between appointments while sipping a refreshing...

Lïa Desmousseaux de Givré
Companies: How to secure teleworking
The use of teleworking has exploded and represents a major trend. This brings new challenges in terms of cybersecurity. Between the perceived improvement in quality of life for many employees and the assurance of a minimum continuity of activity in the...

Lïa Desmousseaux de Givré
Why generate a random password?
Often, when an individual needs to create a new password, they will rack their brains and choose personal information that relates to them, then modify it by changing elements or adding special characters. Unfortunately, this is a bad strategy: all of...

Thomas Le Coz
How to properly manage your passwords
Managing identification, and more specifically passwords, is a key lever in cybersecurity. This is part of [good cybersecurity practices](/blog/personal-cybersecurity): if you have a good password policy in place, it is harder to attack and compromise your accounts, whether they are professional...

Lïa Desmousseaux de Givré
What is Juice Jacking ?
Juice jacking is a type of cyber attack that exploits USB charging cables or chargers to compromise devices with USB ports, especially mobile phones. Charging cables don't just power your phone's battery. They also facilitate data transfer, like when importing photos...

Thomas Le Coz
General cybersecurity recommendations for businesses
Very often during discussions with our clients, we realize that some basics of cybersecurity are not necessarily mastered. It is both common and dangerous. Cybersecurity is everyone's business and it is important to communicate and educate each employee about the basic rules...

Lïa Desmousseaux de Givré
Good practices of personal cybersecurity
We live in an increasingly connected world. Everyone has a phone with capabilities that surpass most computers available a few years ago, telecommuting is strengthening, most employees have a professional laptop, and our coffee machines are connected to the Internet. In...

Lïa Desmousseaux de Givré
Cybersecurity and work from home
In this article, we will focus on cybersecurity at home, or how to secure your telecommuting from home. The rules and best practices explained in this article apply to telecommuting of all kinds, but if you prefer the smell of coffee...

Lïa Desmousseaux de Givré
Securing telecommuting: the complete guide
How to secure telecommuting? In recent months, we have published various articles on cybersecurity and telecommuting. Indeed, the context of the health crisis has led to an increase in telecommuting. Sometimes implemented in a hurry, this brings its share of risks...
