
Information security
Are you having connection problems? Do you think you’ve been the victim of a scam? We would like to remind you of the security measures that we all need to follow. Discover below the main risks of fraud.

Phishing
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information

Vishing
Vishing (voice phishing) is a phone call scam
Vishing (voice phishing) is a phone call scam

Malicious software
Fraudsters contaminate your computer so they can hack your data
Fraudsters contaminate your computer so they can hack your data

WIFI technology
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...

Good practices to adopt