Patching automation register
P.Leclercq in Security 2025-10-03 governance security tips
 
        
          
To continue documenting security actions, here is a simple example of an automatic patching configuration register.
P.Leclercq in Security 2025-10-03 governance security tips
 
        
          
To continue documenting security actions, here is a simple example of an automatic patching configuration register.
P.Leclercq in Security 2025-09-21 technology security tips
 
        
          
In a world where cyber threats evolve rapidly, regularly updating systems is essential to protect your data. Security patches close vulnerabilities exploited by hackers, but applying them manually can be tedious and often overlooked. Automating this process is therefore an effective solution to ensure continuous protection. This is the reason why it is the second recommendation in the Cybersecurity Fundamentals Small, and is present in all the main security frameworks.
P.Leclercq in Security 2025-08-01 governance security tips
 
        
          
Before delving further into Cyberfundamentals, we’ll address an issue that isn’t explicitly listed in the texts, but which is fundamental to meeting the following requirements: asset inventory. Indeed, “how do you protect what you don’t know?” is a well-known saying in security.
P.Leclercq in Security 2025-07-26 governance security tips
 
        
          
When we talk about security and compliance, we must also talk about documentation. It’s important to keep a list of actions to be taken, their progress, and their results throughout the lifecycle of an initiative.
P.Leclercq in Security 2025-07-05 technology security tips
 
        
          
Using the same password across multiple accounts might seem convenient, but it’s one of the biggest security risks you can take. Here’s why unique passwords and a password manager are essential for your business survival.
P.Leclercq in Security 2025-06-21 technology security tips
 
        
          
Here’s a step-by-step guide to enabling two-factor authentication (or two-step verification) on your Google Account, along with instructions on how to use it once set up. This feature strengthens your account’s security by adding an extra step when logging in. This will prevent an imposter from logging in to your account even if they’ve stolen your username and password.
P.Leclercq in Security 2025-06-08 governance technology security tips
 
        
          
Two-factor authentication is a security method that requires two distinct forms of identification to access an account or system. Unlike traditional password-only authentication, 2FA adds an additional layer of protection.
P.Leclercq in Security 2025-04-24 security tips governance
 
        
          
According to its creator, the Centre for Cybersecurity Belgium (CCB), “The CyberFundamentals Framework is a set of concrete measures to protect data, significantly reduce the risk of the most common cyber-attacks, and increase an organisation’s cyber resilience.”
P.Leclercq in Security 2024-05-16 technology security tips
 
        
          
I still recently encountered a case where it was enabled on some systems in an enterprise, so here is a small reminder.
P.Leclercq in Security 2023-09-24 security tips
 
        
          
As noted in the previous article about reporting phishing to authorities, sharing the methods and means used by hackers is important to prevent others from becoming victims of criminal acts.
Fortunately, major browser manufacturers have recognized the importance of user safety and have provided mechanisms protecting the user.