This article is structured around four complementary approaches aimed at strengthening end‑to‑end backup security. After addressing, in Part 1, backup usability (1) and the security of the backup infrastructure (2), this second part focuses on the last two approaches: protecting…
Author: Axel Petersen
In 2025, ransomware attacks remained a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 2025 [1] ). Protecting backups, now also subject to strengthened regulatory requirements such as NIS 2, has therefore…
Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities. On…
During protests in Philadelphia towards the end of May 2020, two police vehicles were set on fire. Photos of the event posted on Instagram and cross-referencing of aliases, visible on Etsy, Poshmark and LinkedIn, will lead[1] an FBI investigator to…
Search engines, such as public ones like Google or companies’ internal intranet search tools, are typically used so one can find information about a topic that they are interested in. However, a more nefarious way to use these tools has…
Les moteurs de recherche publics ou internes aux organisations offrent un moyen de « pêcher » des informations sensibles et techniquement accessibles à tous via des mots clefs bien choisis – les « Dorks ». Deux actes médiatisés ces dernières…
L'USB est quasiment incontournable. L'interconnexion non maîtrisée des dispositifs avec le SI est facilitée par les comportements humains. Les moyens d'attaques se perfectionnent et le risque s'accroît, notamment vis-à-vis des attaques ciblées. Une vigilance toute particulière doit être accordée à…
