Our articles
Our articles
Has your company thought about secure hybrid working?
In hybrid mode, it is essential that teleworkers have access to the corporate network. However, the type of remote access to the corporate network can cause major issues that can jeopardise the company's security if a “DIY” VPN system has been set up.
Read this articleAuthor
Béatrice SeiwertPublished on
19 March 2024
Interview with 4 women in tech
As part of International Women's Rights Day, discover our interview with 4 "Women of Tech".
Read this article
Author
Marion CuisinierPublished on
06 March 2024
M2M's future is eSIM
Use cases based on the ability of connected objects to communicate with each other are multiplying rapidly. By 2030, an estimated 50 billion objects will be connected and exchanging data across a wide range of ecosystems. To support this transformation, technology must also evolve. Innovations on the eSIM are opening up new opportunities to facilitate the integration of components and enable players implementing M2M/IoT solutions to become more agile. The possibilities offered by these developments were recently discussed in our webinar entitled “M2M’s Future is eSIM”.
Read this article
Author
Júlio PinhoPublished on
27 February 2024
DDoS attacks in Luxembourg in 2024
Discover the statistics of DDoS attacks detected in Luxembourg in 2024 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
01 February 2024
How can we spot a deepfake?
Artificial intelligence and deep learning technologies now make it possible to create content from scratch, featuring real people with a very high degree of realism. And with these so-called deepfakes, new risks are emerging. How can you guarantee the authenticity of an image or video? How can you tell the difference between what’s real and what’s not? What can be done to combat the spread of counterfeit content? For several years, POST Luxembourg – in partnership with the University of Luxembourg – has been working on these issues, and they’re more prevalent than ever.
Read this article
Author
Cu NguyenPublished on
30 January 2024
How do you create – and remember – secure passwords?
From email inboxes to online shopping websites and e-banking pages: they all ask you to create an account, which requires a password. To make life easier, many people choose the same password for all their accounts so they don't forget it. However, this is highly risky: should they discover your password, cyber-attackers have easier access to all your information so they can steal your identity and use your bank account.
Read this articleAuthor
Béatrice SeiwertPublished on
23 January 2024
Technology and telecoms: five major trends for 2024
How will the use of technology and networks evolve in 2024? In this article, we take a look at five major trends to keep an eye on.
Read this article
Author
Abigail ChaudierPublished on
16 January 2024
Managing your time better at work
How can you better manage your time at work to be more productive, more focused and therefore less stressed? We have some tips for you! Completing several tasks in a single working day isn’t always as easy as it seems. Careful planning is key because it helps us set realistic goals and – most importantly – finish a busy day’s work in peace.
Read this articleAuthor
Béatrice SeiwertPublished on
09 January 2024
Preventing DDoS attacks by blocking illegitimate traffic
The number of so-called Denial of Service (DDoS) attacks in Luxembourg is increasing month after month. Cybercriminals are hijacking connected devices to send illegitimate traffic to organisations and saturate connections. These attacks have the effect of degrading the level of service or paralysing the business. To help Luxembourg businesses protect themselves against these attacks, POST has solutions for blocking illegitimate traffic (in real time if needed) before it reaches the organisation's systems.
Read this article
Author
Paul FelixPublished on
19 December 2023
Four key questions about Teams Phone
Microsoft's collaboration platform Teams has become a part of everyday life for many employees in Luxembourg. However, not many know that you can integrate a company's telephone network into Teams. This feature brings all your communication channels onto one platform and offers greater flexibility to your employees.
Read this article
Author
David AccohPublished on
05 December 2023
SIM, eSIM and iSIM: the constant reinvention of mobile connectivity
Thanks to eSIM, for a few years now it has no longer been necessary to insert a SIM card in your smartphone to connect to the network. The card is embedded in the phone. Although the use of eSIM cards is still far from widespread in Europe, the technology that could replace them is already emerging. With iSIM, the SIM card’ s functionalities are directly integrated in the mobile device's main processor. The virtualisation of cards offers new opportunities for users and promises savings for manufacturers. It also makes it easier to connect much smaller objects, while ensuring a high level of security.
Read this article
Author
Benjamin VasseurPublished on
21 November 2023
Reduce the energy consumption of your network infrastructure with ConnectedOffice
These days, it’s rare to see an employee without a laptop or other connected device to carry out their day-to-day tasks. To ensure these digital tools are used responsibly, setting up a telecommunications network is essential. In this article, we give you some tips on how to better manage the energy consumption of your ConnectedOffice system.
Read this articleAuthor
Fanny NganPublished on
14 November 2023
Setting up a business in Luxembourg: what do you need to consider?
The Luxembourg market is attractive for entrepreneurs. The country's dynamic economy is a source of many opportunities for those wishing to set up their own business. Developing your business is not something you can improvise, however. You need to be well prepared, surround yourself with the right partners and find the right financing.
Read this articleAuthor
Béatrice SeiwertPublished on
07 November 2023
Cyberscore: the Security Rating for SMEs in Luxembourg
A Cyberscore is an initiative developed by POST and Luxcontrol to help small and medium-sized companies in Luxembourg tackle cybersecurity issues more easily.
Read this article
Author
Marion CuisinierPublished on
24 October 2023
October, European Cybersecurity Month.
To inaugurate European Cybersecurity Month, ENISA (the European cybersecurity agency) published an article in September 2023 highlighting the risks of increased phishing linked to new technologies that are likely to grow between now and 2030.
Read this articleAuthor
Fanny NganPublished on
17 October 2023
Landline business telephony continues its transition to All-IP
Many organisations whose telephone systems are still based on analogue technology are now being encouraged to move in this direction. The change is also a great chance to rethink your telephone services, taking into account your needs and the new possibilities offered by technology.
Read this article
Author
Luc HalbardierPublished on
03 October 2023
Nomadism, the new way of working in companies
Teleworking, and hybrid working are now part of everyday business life, turning any location into a potential workspace. We are now talking about “nomadism" at work, which means equipping ourselves with the appropriate tools and services to ensure that your employees are productive and collaboration, while securing your company's network and data.
Read this articleAuthor
Béatrice SeiwertPublished on
19 September 2023
Ten years of easier business telephony management thanks to CloudPBX
. In the world of business telephony, this new product represented a major step forward, allowing for fixed-mobile convergence, offering greater flexibility to employees and making it considerably simpler to manage in-house telephone systems.
Read this article
Author
Sophia KadriPublished on
15 September 2023
Helping companies acquire a genuine data culture
Implementing a “Data Intelligence” approach within your organisation is a major project, which entails considering many aspects of the technology. If you want to adopt a data analysis process or, ultimately, use artificial intelligence or machine learning throughout your organisation, you first need to be familiar with your data and have full control over it.
Read this article
Author
Nicolas VivarelliPublished on
12 September 2023
E-book International
With continued technological advances, IoT has become more important now than ever before, reducing human effort for several activities and providing tons of data, for later on be processed and give place to meaningful information.
Read this article
Author
Júlio PinhoPublished on
05 September 2023
The HELIX building – technology that works for users
POST's new headquarters, HELIX, located opposite Luxembourg station, includes a host of technological choices to enhance the experience of visitors and employees alike.
Read this article
Author
Laurent RapinPublished on
17 August 2023
The essential evolution of SOCs towards a hybrid mode
With the constant evolution of digital environments, POST is transforming its SOC into a hybrid by combining several technological advances.
Read this article
Author
Dylan DintransPublished on
08 August 2023
Summer tips and tricks
With the summer holidays upon us, here are a few tips and tricks to make your work easier
Read this articleAuthor
Béatrice SeiwertPublished on
24 July 2023
Internet access for professionals on the move
Where individual employees are regularly expected to travel or work from multiple sites, mobile data connectivity solutions are one possibility.
Read this article
Author
Benjamin VasseurPublished on
18 July 2023
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 2)
This article is the second part of case study CVE-2022-46527 and will discuss the discovery of the vulnerability and a proof of concept leading to a crash
Read this articlePublished on
26 June 2023
Preparing your IoT project and choosing the right supplier
Beyond the conception stage, the implementation of a project or the creation of a business based on connected technology entails the consideration of various aspects. So what should I be aware of?
Read this article
Author
Júlio PinhoPublished on
13 June 2023
Technology for more efficient space management
By facilitating the collection of data, technology allows for a more effective understanding of emerging needs
Read this article
Author
Laurent RapinPublished on
22 May 2023
Better integration of new technologies for fixed-mobile collaboration
Technology for telephony, collaboration and overall company-wide connectivity is evolving rapidly.
Read this articleAuthor
Lionel VogelPublished on
24 April 2023
Are Our Phones Listening to Us?
Although our phones seem to be spying on us, there are ways to make sure our conversations stay private.
Read this articleAuthor
Béatrice SeiwertPublished on
13 April 2023
7 key technological trends and developments in 2023
Accompany us, and our partner Splunk, to find out about the trends and technological developments to watch out for in the coming months.
Read this article
Author
Marion CuisinierPublished on
03 April 2023
5 levers to reduce the environmental footprint of your IT
Operating more responsibly digitally means reducing energy-intensive computing resources.
Read this article
Author
Luc HalbardierPublished on
21 March 2023
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 1)
Setting up the environment to scan IoT devices for vulnerabilities: Case of CVE-2022-46527
Read this articlePublished on
14 March 2023
Improving safety and efficiency in truck transport with IoT technologies
The use of connected sensors and devices in trucks to capture data about different aspects of transport, such as geographic location or temperature, has resulted in the real-time access to tracking information appreciated and now considered standard by businesses as well as major improvements in freight monitoring and safety.
Read this article
Author
Klaus FuchsPublished on
12 March 2023
Protecting your SME from cyber threats
POST includes security features in its business connectivity offering - ConnectedOffice to protect SMEs
Read this articleAuthor
Béatrice SeiwertPublished on
08 March 2023
ConnectedOffice, the business offer for connectivity
POST's ConnectedOffice is an all-in-one offering that addresses the simple to complex connectivity and networking needs of SMEs
Read this articleAuthor
Fanny NganPublished on
28 February 2023
IoT cost optimization
There are a number of factors to consider when determining the best pricing plan for M2M or IoT connectivity
Read this article
Author
Júlio PinhoPublished on
21 February 2023
DDoS attacks in Luxembourg in 2023
Discover the statistics of DDoS attacks detected in Luxembourg in 2023 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
15 February 2023
IoT: a vector for saving energy and water
Thanks to the IoT, sensors can be deployed anywhere to provide a better understanding of how energy is consumed
Read this article
Author
Laurent RapinPublished on
14 February 2023
A guaranteed alert if an alarm is triggered
Alarmis is a POST offer that transmits the alert in case of fire or intrusion to the rescue units
Read this articleAuthor
Fanny NganPublished on
09 February 2023
Reliable wireless connectivity key for electric charging stations
An individual electric charging station may involve multiple players, including the manufacturer, the company installing the station, and in some cases, a backend operator.
Read this article
Author
Klaus FuchsPublished on
08 February 2023
POST SIM cards active in 82 countries
From Luxembourg, POST deploys SIM cards to customers in 82 countries to connect objects around the globe
Read this article
Author
Júlio PinhoPublished on
31 January 2023
20,000 phishing SMS posing as Guichet.lu detected in one week
In recent weeks, an extensive SMS phishing campaign has targeted Luxembourg mobile numbers, pretending to be the Public Administration citizens’ portal.
Read this article
Author
Cu NguyenPublished on
19 January 2023
Can we really trust the cloud?
Cloud platforms offer organisations many new opportunities, how can they be fully exploited?
Read this article
Author
Luc HalbardierPublished on
20 December 2022
Extracting value from your data
A Big Data approach can create value in many ways. Discover the potential through a few concrete use cases
Read this article
Author
Nicolas VivarelliPublished on
13 December 2022
Dealing with increasingly frequent DDoS attacks
When targeted by volumetric attacks, Luxembourg organisations can quickly find themselves paralysed, and literally cut off from the internet
Read this article
Author
Paul FelixPublished on
29 November 2022
Ensuring optimal indoor mobile coverage
A building’s occupants can struggle to access the traditional mobile network due to the building’s structure, construction materials or insulation. With ‘Indoor Mobile Coverage’, POST can help you implement solutions for optimal mobile connectivity indoors.
Read this article
Author
Justin StephanyPublished on
15 November 2022
Why outsource your print management?
In the heart of an organisation, the management and monitoring of your printing can be a burden. What if, to meet your needs in this area, you opted for an outsourced service to monitor and manage your printing solutions, as POST offers? This approach allows you to save money, reduce your environmental footprint while contributing to the productivity of your teams and improving the security of your information
Read this articleAuthor
Béatrice SeiwertPublished on
10 November 2022
A new work organisation
In the space of a few months, our understanding of the working environment and the way work is organised has changed fundamentally. Everyone now works from a variety of locations: from home, teleworking, from the office, or from a meeting room. The challenge, therefore, is to be able to connect easily to others, to the organisation, to its resources and data, to the tools and processes in place.
Read this article
Author
Daniel SantosPublished on
20 October 2022
Customise the icons of your apps is possible
Are the application icons on your smartphone's interface not to your liking? You can change them. For Android and iOS, we show you how to do it.
Read this articleAuthor
Béatrice SeiwertPublished on
14 October 2022
DDoS attacks in Luxembourg in 2022
Discover the statistics of DDoS attacks detected in Luxembourg in 2022 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
11 October 2022
5G: now a reality filled with opportunity
5G tackles the issue of increasing production and consumption of data through mobile devices. For smartphone users, the switch from 4G to 5G will not so much be an evolution as a revolution.
Read this article
Author
Justin StephanyPublished on
04 October 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART2: gaining code execution
How to exploit the vulnerability in Firefox 56 and 57 to get code execution
Read this articlePublished on
19 September 2022
Is the metaverse the future of the Internet?
Bloomberg estimates that the metaverse market could be worth $800 billion by 2024, and yet this emerging phenomenon remains a mystery to many of us. Why should we find out more and what can we expect?
Read this article
Author
Marion CuisinierPublished on
13 September 2022
Improving remote monitoring and support for patients
Medical support is changing through mobile connectivity. Smart devices, for example, can be used to develop remote care services.
Read this article
Author
Jean MarquesPublished on
08 September 2022
Cybersecurity weather forecast – 2nd quarter 2022
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
16 August 2022
The POST CyberForce big interview
“The most striking event of 2021 was undoubtedly the reporting and malicious exploitation of the log4j vulnerability.”
Read this article
Author
Marion CuisinierPublished on
19 July 2022
Cybersecurity: peace of mind with the POST SOC
Using a Security Operations Centre (SOC) allows organisations to constantly monitor activity on their IT systems so as to take quick and effective action in the event of an attack or anomaly.
Read this article
Author
Alan OlszewskiPublished on
12 July 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART1: controlling the instruction pointer
Find out how to take advantage of the whole underflow vulnerability on Firefox 56 and 57
Read this articlePublished on
04 July 2022
How to boost marketing performance by leveraging data
Data is the central resource in the digital economy and a vital driver of value creation. The challenge for companies is to manage the data available and use it to meet their business needs.
Read this article
Author
Nicolas VivarelliPublished on
21 June 2022
Smart vending: connectivity for remote management of vending machines
IoT connectivity is helping to improve the monitoring of these dispensers by providing real-time data on their use.
Read this article
Author
Laurent TurmesPublished on
09 June 2022
Cybersecurity weather forecast – 1st quarter 2022
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
19 May 2022
Wi-Fi: how to ensure optimal coverage
For a business whose staff are on the move, Wi-Fi allows individuals to connect to the internet quickly and securely without incurring mobile data charges.
Read this article
Author
Benjamin VasseurPublished on
02 May 2022
Simulate attacks on telecom networks to better protect them
Telecoms networks are the target of increasingly frequent attacks by malicious actors seeking to hijack them or intercept communications.
Read this article
Author
Alexandre De OliveiraPublished on
19 April 2022
Take control of your telecoms solutions
Keep an eye on consumption, easily activate or deactivate SIM cards and ensure that all services are operational.
Read this article
Author
PitPublished on
12 April 2022
Preventing risky connections with DNS protection
Faced with a variety of cyber threats, organisations now have an opportunity to strengthen their security with a DNS protection solution and ensure the legitimacy of business-related traffic.
Read this articleAuthor
Béatrice SeiwertPublished on
22 March 2022
Using the IoT to make office and parking spaces more flexible
Offering more flexibility appears to boost employee commitment. A study by the firm EY, for example, found that 50% of employees would consider resigning if they were not given the opportunity to work remotely or in a more flexible way.
Read this article
Author
Laurent RapinPublished on
15 March 2022
Adversary simulation exercise: when real-life meet business
This article is short story telling about one adversary simulation exercise we (POST CyberForce Offensive Security) performed.
Read this articlePublished on
08 March 2022
Cybersecurity weather forecast – 4th quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
22 February 2022
Improving machine operation on construction sites with the IoT
Tralux and Mako, both well-versed in the needs of industry players, have joined forces with technology expert POST to create a platform for monitoring equipment on construction sites.
Read this article
Author
Laurent RapinPublished on
08 February 2022
Four ways to become more efficient in an age of hybrid work
Employees are now working and communicating from any location, however far apart they happen to be. One of the challenges of our times is to provide staff members with work tools that allow them to be efficient, as well as more responsive to their customers.
Read this article
Author
David AccohPublished on
25 January 2022
The mobile – an increasing presence in our lives
Mobiles may already be a fixture of daily life for many, but mobile phone usage is still on the rise in Luxembourg and around the world. This change concerns both the private and the professional sphere.
Read this article
Author
PitPublished on
14 December 2021
Cybersecurity weather forecast – 3rd quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
30 November 2021
Working closely with SMEs to support their development
POST’s Medium Business service is designed to meet the IT and telecoms needs of medium-sized companies by offering tailored, long-term support.
Read this articleAuthor
Béatrice SeiwertPublished on
16 November 2021
Keeping constant watch over your business connectivity
With connectivity becoming increasingly vital, companies must be able to control, guarantee and proactively manage their connectivity to support business growth, ensure access to services and user safety, and meet ad-hoc needs.
Read this article
Author
Paul FelixPublished on
04 November 2021
Securing endpoints in the age of remote working
How can organisations protect against threats when the IT environment is more open, employees are working remotely, and there is a greater range of employee devices (workstation, mobile or tablet) in play?
Read this article
Author
PitPublished on
18 October 2021
DDoS attacks in Luxembourg in 2021
Discover the statistics of DDoS attacks detected in Luxembourg in 2021 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
30 September 2021
Connected objects in a healthcare setting
Connected objects are being increasingly used in the field of healthcare. New apps are facilitating hospital management and patient monitoring. Moreover, 5G opens up new opportunities.
Read this article
Author
Laurent RapinPublished on
23 September 2021
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
You might have seen the recent bug in iOS 14.0 to 14.4, that crashed the Wi-Fi service by naming an access point a specific way. Apple tagged this bug as a Denial of Service on the Wi-Fi service, but the Zecops [1] Research Team has shown proofs that it could be exploited, causing an RCE, and more precisely a Zero-Click RCE.
Read this articlePublished on
07 September 2021
Cybersecurity weather forecast – 2nd quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
17 August 2021
Five good reasons to rethink your business telephony
With the widespread shift to telework during lockdown, companies had no choice but to make the most of the technology available in order to maintain operations and continue to collaborate.
Read this articleAuthor
Béatrice SeiwertPublished on
27 July 2021
How an eSIM makes life easier
An eSIM makes it much easier to juggle multiple numbers on a single device. Among other advantages, having a mobile with a built-in electronic SIM card offers you greater freedom when travelling abroad.
Read this article
Author
Benjamin VasseurPublished on
13 July 2021
Anatomy of a Red-Team exercise - Chapter 3
As discussed in previous scenario, we prepared several raspberry devices with a 4G modem, allowing us to remotely control the device without requiring being in proximity for operation.
Read this articlePublished on
29 June 2021
Enjoy all the benefits of IP telephony
With IP telephony, organisations can access new features offering benefits such as simpler collaboration among employees or improved monitoring of communications.
Read this articleAuthor
Béatrice SeiwertPublished on
25 May 2021
Cybersecurity weather forecast – 1st quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incidences
Read this article
Author
PitPublished on
11 May 2021
Anatomy of a Red-Team exercise - Chapter 2
Prior any actions, we focused on the payload crafting that will be used with our attack scenarios. We decided to go for PowerShell stageless reverse HTTPS payload that will be delivered using HTA dropper and then executed on the target machine.
Read this articlePublished on
20 April 2021
Social media – now a key sales channel
If you have something to sell, developing a presence on social media can prove to be a profitable strategy, whether you are targeting a B2B or B2C clientele. However, to use these channels successfully, you need to take a consistent approach and regularly share relevant content.
Read this articleAuthor
Béatrice SeiwertPublished on
06 April 2021
Anatomy of a Red-Team exercise - Chapter 1
A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.
Read this articlePublished on
22 March 2021
Making room for women in cybersecurity
To mark International Women’s Day, we’re offering you an opportunity to meet Aurélie Da Silva, Information Security Officer at POST Luxembourg.
Read this article
Author
PitPublished on
08 March 2021
Cybersecurity weather forecast – 4th quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incid
Read this article
Author
PitPublished on
25 February 2021
Cybersecurity: how to reduce false positives
Increased scrutiny of network infrastructure has sent the number of security alerts skyrocketing. However, IT teams have a tendency to ignore these alerts amid so much crying wolf, and this poses a critical security risk to their business.
Read this article
Author
Dylan DintransPublished on
04 February 2021
A three-step approach to face up to the challenges of IoT security monitoring
As convenient as IoT solutions can be, they also present new security risks. Not only, the number of devices is increasing in magnitude, they may be exposed also to physical access.
Read this article
Author
PitPublished on
14 January 2021
Cybersecurity weather forecast – 3rd quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
10 November 2020
How do correlation strategies work within an SOC?
Phishing, ransomware… cyber-attacks against businesses have surged this year. To protect against them, more and more businesses are choosing to set up an SOC: Security Operations Centre.
Read this article
Author
Alan OlszewskiPublished on
20 October 2020
Smart parking for companies: why not make your car parks intelligent?
Access to parking is an important criterion whether you are looking for new customers or recruiting new talent. But it is also a cost centre for companies that can be optimised through the IoT.
Read this article
Author
Laurent RapinPublished on
21 September 2020
SMEs: did you know that chatbots can save you valuable time?
What does artificial intelligence have to offer SMEs? Has the time come to embrace the chatbot revolution?
Read this articleAuthor
Béatrice SeiwertPublished on
25 August 2020
The human factor is a key to cybersecurity strategy
Companies need to protect their information, whether physical or digital. Moreover, threats do not come from outside the company alone. Internal threats are all too real, and all too often overlooked.
Read this article
Author
PitPublished on
15 July 2020
Cybersecurity weather forecast – 2nd quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
08 July 2020
Microsoft Direct Routing: unified communication by Microsoft
Microsoft Teams, the leader in collaboration solutions, launches Direct Routing. This unified communications solution allows businesses to make all their calls via a single tool: MS Teams.
Read this article
Author
Luc HalbardierPublished on
05 June 2020
Cybersecurity weather forecast – 1st quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
18 May 2020
Eight timely tips on “digital responsibility”
Lockdowns have caused spikes in consumption and put strain on the telecoms infrastructure. Everyone now has a duty to embrace “digital responsibility”. While European operators say they are ready to manage the crisis, they are all calling on us to act responsibly.
Read this articleAuthor
Béatrice SeiwertPublished on
03 April 2020
Five good reasons to adopt a mobile fleet management tool
Keeping track of hundreds of devices, telephone lines and data consumption that can quickly get out of hand – it’s all in a day’s work for a mobile fleet manager. How can you keep your fleet and costs under control?
Read this article
Author
Jacques KellnerPublished on
10 March 2020
Make the SOC more efficient with the help of an orchestrator
With any cyber threat, a rapid response is essential. The use of an orchestrator at the SOC, based on the automation possibilities offered, makes it easier to monitor alerts and take quicker decisions when facing a cyber risk.
Read this article
Author
Thomas ProfetaPublished on
01 January 1970
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?