5 tips for reinforcing information systems security


Nine out of ten security breaches are the result of social engineering or phishing, meaning deceptive manoeuvrings whose goal is to usurp the identity or steal the login details of information systems users. Likewise, most acts of fraud (65%) carried out on companies do not come from premeditated acts or a weakness in the system, but actually from an exploited opportunity to commit fraud.

Across the whole information systems protection chain (a notion much vaster than “cyber security” and which includes both digital and analogue systems), the human element is still the weakest link. In fact, it constitutes the bulk of the 4 million euros spent every year by businesses in an attempt to block breaches in their security system. Continue reading