Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Archives for the year: 2021

You are here:
  1. Home
  2. 2021

macro code

How macros work and fraudulent uses

Before You Click, Phishing, RansomwareBy Steph76October 5, 2021

What is a macro? A macro, or macro-instruction, is a program that automates a series of operations using VBA (Visual Basic for Applications), particularly in office software such as Excel or Word. You don’t need to know how to program to use it. A VBA macro is a procedure used to perform…

Reporting incidents: a difficult task

Reporting incidents: a difficult task.

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76July 13, 2021

Internet users prefer to sweep their mistakes under the mouse mat rather than report an incident. A Fujitsu study shows that users are even more reluctant to report IT incidents when they occur at work. This study, entitled "Building a Cyber Smart Culture," explains...

Colonial Pipeline cyberattack in the USA

Cyberattack hits Colonial Pipeline in the US

News on the web, Before you click, Cyberattacks, Cyberattacks on businesses, RansomwareBy Steph76June 3, 2021

The facts One of the largest fuel pipelines in the United States, Colonial Pipeline, which connects gas stations, refineries, and airports in the eastern United States, recently suffered a large-scale cyberattack. The attack The company was forced to shut down all its systems following this digital attack. It says it has hired a team...

QR codes and cyberattacks: what are the risks?

QR codes and cyberattacks: what are the risks?

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76May 18, 2021

What is a QR code? A QR code (Quick Response code) is a two-dimensional barcode. It links to a web page or other content that is normally optimized for mobile and tablet access. The QR code consists of modules, usually black, arranged in a square with a white background. It was invented in 1994...

Organized phishing

Phishing: increasingly well organized

Before Clicking, PhishingBy Steph76May 6, 2021

Who has never received a phishing email? Phishing is a fraudulent technique, akin to attempted fraud, involving the sending of an email message. Cybercriminals collect personal data, login credentials, and/or banking information for fraudulent purposes (source: cybermalveillance.gouv.fr). While...

←123→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest