Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Category Archives: Uncategorized

You are here:
  1. Home
  2. Category "Uncategorized"

Detection of smartphone spyware on a mobile phone in an office, symbolizing the invisible enemy of employees.

Smartphone spyware: the invisible enemy in your pocket

Cyberattacks, Uncategorized, Phishing, RansomwareBy James DIGEONMarch 26, 2026

Smartphone spyware: the invisible enemy in your pocket We all have the same habit: our phones are always with us. They’re on our desks, in our pockets, and they hold our entire lives (our work emails, family photos, and banking passwords). But imagine for a moment… Your phone is sitting there,…

Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest