Latest articles

The magic link, or how to combine user experience and cybersecurity

Definition • 25 April 2025

The magic link, or how to combine user experience and cybersecurity

Find out what a magic link is: a simple, fast and secure method of authentication without passwords. Benefits, how it works, use cases... we explain it all!

How can you protect your business from cryptoviruses?

Tip • 13 November 2024

How can you protect your business from cryptoviruses?

Cryptoviruses are malicious software. Increasingly common, they require upstream intervention to limit the damage.

Understand the concept of cybersecurity to (better) protect your business

Word from the expert • 29 October 2024

Understand the concept of cybersecurity to (better) protect your business

Of all the sensitive issues linked to the development of digital technology in business, there is one that worries us more than any other: cybersecurity. Here's why.

How can you ensure that your emails are authenticated using DMARC?

Definition • 29 October 2024

How can you ensure that your emails are authenticated using DMARC?

5 letters for 2 main issues: less spam and more deliverability for your emails. Authenticate your emails, improve your reputation and stand out from the crowd!

Cybercrime: examples and measures to protect sensitive projects

Tip • 29 October 2024

Cybercrime: examples and measures to protect sensitive projects

Lionel Roux, CEO of Wimi, makes us aware of the dangers hanging over IT security and gives us some excellent advice on how to guard against threats.

What is the FGPP, or how to apply a refined password policy?

Definition • 29 October 2024

What is the FGPP, or how to apply a refined password policy?

What is an FGPP, or fine-tuned password policy, in the context of Active Directory? How does it differ from GPOs? How do you apply it? We tell you all about it.