Online fraud identification
Check whether a profile, site, email or contact truly matches what it claims to be.
See the detailed sheetDigital identity verification
Check the consistency of an online identity before a personal or professional commitment.
See the detailed sheetDevice analysis
Examine a client device (macOS, iOS, Linux) under a signed written mandate.
See the detailed sheetAccount protection
Secure online accounts with robust passwords, 2FA and a password manager.
See the detailed sheetData Protection / Backup
Set up an adapted, tested backup and restore strategy.
See the detailed sheetAwareness
Understand how an attack worked, without blame. Focus on social networks and chat.
See the detailed sheet