![](/typo3temp/assets/_processed_/9/f/csm_information_security_09_6b23f78d09.webp)
Information Security
Are you having connection problems? Do you think you’ve been the victim of a scam? We would like to remind you of the security measures that we all need to follow
![](/typo3temp/assets/_processed_/e/8/csm_Phishing_vignette_11_80a62218cf.webp)
Phishing
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information
![](/typo3temp/assets/_processed_/d/1/csm_Vishing_vignette_05_60a0de378d.webp)
Vishing
Vishing (voice phishing) is a phone call scam
Vishing (voice phishing) is a phone call scam
![](/typo3temp/assets/_processed_/8/5/csm_software_vignette_09_d1a5ae5436.webp)
Malicious Software
Fraudsters contaminate your computer so they can hack your data
Fraudsters contaminate your computer so they can hack your data
![](/typo3temp/assets/_processed_/c/d/csm_wifi_vignette_05_7add417a40.webp)
WIFI Technology
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...
![](/typo3temp/assets/_processed_/7/3/csm_good_practice_vignette_09_95efa9edbe.webp)
Good practices to adopt