Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Category Archives: Ransomware

You are here:
  1. Home
  2. Category: "Ransomware"

Detection of smartphone spyware on a mobile phone in an office, symbolizing the invisible enemy of employees.

Smartphone spyware: the invisible enemy in your pocket

Cyberattacks, Uncategorized, Phishing, RansomwareBy James DIGEONMarch 26, 2026

Smartphone spyware: the invisible enemy in your pocket We all have the same habit: our phones are always with us. They’re on our desks, in our pockets, and they hold our entire lives (our work emails, family photos, and banking passwords). But imagine for a moment… Your phone is sitting there,…

Passwords: the cornerstone of your organization's security

Passwords: the cornerstone of your organization's security

Before You Click, Cyberattacks, Ransomware, Security RecommendationsBy Steph76September 23, 2024

More and more, organizations are equipping themselves—and understandably so—with firewall, anti-malware, and antivirus software… And given the nearly daily security incidents, which sometimes make headlines, it’s easy to see why. However, these tools are of limited use unless they are paired with an awareness program for…

NIS2 Directive: a small step for mankind, a giant leap for cybersecurity

Web News, Before You Click, Cyberattacks, RansomwareBy Steph76August 20, 2024

Cybersecurity risks are on the rise (phishing remains the most widespread threat: with approximately 562.4 million phishing emails recorded), making it necessary to strengthen security standards. Within organizations, security must be strengthened both technically and organizationally. In…

QR code phishing, QR code attack => QRishing

Have you heard of QRishing?

Web News, Before You Click, Cyberattacks, RansomwareBy Steph76October 9, 2023

What is QRishing? QRishing works on the same principle as traditional phishing: tricking victims into visiting malicious websites. However, instead of using hyperlinks, cyberattackers use QR codes. These codes can be printed and placed in public areas, sent by mail, or…

What is tailbating?

What is tailgating?

Web News, Before You Click, Cyberattacks, RansomwareBy Steph76February 7, 2023

What is tailgating? Tailgating, also known as “piggybacking,” is a technique used to gain unauthorized physical access to a building or secure area by posing as an employee or authorized visitor. The term comes from the fact that the intruder slips in behind an authorized person to enter a building or secure area,…

→12345…
67
8→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest