In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of the corporate network as well as personal data.
Organisations should assume that sooner or later they will be confronted with a ransomware attack. The main question is when. Preparation is key.
This is a guide about urgent actions to take when a ransomware has hit your company.
We provide here guidance on generic, pragmatic and generic technical criteria and some relevant references for Antivirus, EDR and XDR security solutions
If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions.
A Distributed Denial of Service, or DDoS, is a cyber attack that impedes the normal data traffic of a particular service. It can have a major impact on the operations of organisations and businesses.
The intent of this document is to give a brief introduction about ransomware, general techniques, tactics and procedures (TTPs) that are used in a ransomware campaign.
The FPS Chancellery of the Prime Minister uses cookies to ensure the proper functioning of this site. To improve your visit, we also use optional cookies that you can accept or decline. More information can be found on our "privacy policy" page.