Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Category Archives: Security Recommendations

You are here:
  1. Home
  2. Category: "Safety Recommendations"

security-alert-before-clicking-log4shell

Log4shell security vulnerability

Web News, Before You Click, Security TipsBy Steph76January 4, 2022

The facts: Following the Microsoft vulnerability in early December, the Log4Shell security flaw is now making headlines. The Bundesamt für Sicherheit in der Informationstechnik (BSI) (Germany’s equivalent of ANSSI) disclosed its existence on December 10, 2021. It affects the Log4j logging library developed by the Apache Foundation. A library,…

Reporting incidents: a difficult task

Reporting incidents: a difficult task.

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76July 13, 2021

Internet users prefer to sweep their mistakes under the mouse mat rather than report an incident. A Fujitsu study shows that users are even more reluctant to report IT incidents when they occur at work. This study, entitled "Building a Cyber Smart Culture," explains...

QR codes and cyberattacks: what are the risks?

QR codes and cyberattacks: what are the risks?

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76May 18, 2021

What is a QR code? A QR code (Quick Response code) is a two-dimensional barcode. It links to a web page or other content that is normally optimized for mobile and tablet access. The QR code consists of modules, usually black, arranged in a square with a white background. It was invented in 1994...

whaling

Whaling: the new threat for 2021?

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76March 12, 2021

What is whaling? Unlike phishing attempts, which target random individuals, whaling targets specific individuals. Whaling is a threat aimed at business leaders, decision-makers, and managers who have shifted their work processes online due to the health crisis. The goal of…

Cyberattack against the "Christmas without Amazon" petition

Cyberattack against the "Christmas without Amazon" petition

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76November 25, 2020

What happened to the “Christmas Without Amazon” petition? Politicians launched a petition to encourage French consumers to support local businesses for their Christmas shopping. According to its founders, the petition—named “Christmas Without Amazon”—was the target of a “large-scale cyberattack.” The attack took place overnight…

←1234→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest