The importance of a physical security key for stronger authentication
Did you know that 90% of Internet vulnerabilities are caused by stolen credentials? Mobile SMS authentication applications and outdated [...]
Did you know that 90% of Internet vulnerabilities are caused by stolen credentials? Mobile SMS authentication applications and outdated [...]
The SOC, or Security Operations Center, is an operational center specialized in IT security. It brings together IT security [...]
Our partnership with Acronis continues to grow in 2023! After being awarded the Acronis Gold Service Provider label at [...]
The notion of cybersecurity in the corporate world is a highly topical subject that needs to be taken seriously. [...]
Infologo has recently been awarded a new Swiss quality label, the CyberSeal label, a real sign of confidence when [...]
SMEs are increasingly attracted to the local cloud at a time when the cloud computing market continues to grow. [...]
Infologo is an Infomaniak Public Cloud partner in Switzerland. It's an important partnership, because choosing Infomaniak means opting for [...]
Moving your company's IT can be a major challenge, especially when it comes to guaranteeing data security. There are [...]
Infomaniak has launched a new, completely free security product: kPaste. It enables sensitive information such as passwords, login details [...]
In any company, managing IT expenditure is an essential step in the development of the business. It requires careful [...]
The nLPD, the new Data Protection Act, is the total revision of the Federal Data Protection Act (DPA), [...]
The 2002 annual Ignite conference unveiled a Microsoft innovation designed to help meet the challenges of hybrid working: the [...]
Keeper and Dashlane are two well-known password managers for securely storing and managing your online credentials. Keeper is very [...]
A DRP is the English translation for Disaster Recovery Plan (or PRA). The Disaster Recovery Implementation Plan or an [...]
Cybercriminals blackmail and target SMEs by threatening to disclose sensitive data or paralyze services, particularly in the area of [...]
IT outsourcing and cybersecurity: if you have chosen to outsource your IT infrastructure and entrust its management to one [...]
In the event of a disaster, the Disaster Recovery Plan is a streamlined process for rapidly resuming your company's [...]
In Switzerland, the damage caused by cyber attacks is estimated at more than CHF 4 billion a year. And [...]