I have never suffered a cyber attack and I have nothing that cold interest hackers.

This misconception reduces your alertness and therefore increases your risk of being attacked. And don’t be fooled, all your data can be coveted and especially cashed out ! Your information can be sold, used to make purchases without your knowledge and worse, to impersonate your identity on the internet.

I already have an IT society that takes care of my company, is this sufficient ?

IT companies are multi-skilled and therefore need to manage many things at once.

Our CyberDetection offer is complementary because it provides them with a view of the security status of the computer system for which they are responsible.

All this cybersecurity language is very complicated for me, how is it possible to make it more simple?

We use simple terms that are accessible to everyone. We are constantly working to make complicated concepts of cybersecurity accessible.

I’m already protected by an antivirus, why would it be not enough ?

Antiviruses block the software virus but do not monitor its arrival.

Every day, new viruses are released and it has become difficult to be able to detect them all.

Between the time a virus is published, it can take from 1 month to even 1 year before it can be detected and blocked.

I run a small business, why could anyone want to attack me ?

You are the priority target ! SMEs are currently the least well protected and hackers know that ! These companies are therefore all potential targets because they also have confidential data they want to protect (technology used, customer personal data, etc…). Namely, on average, 8 out of 10 cyberattacks are directed at the smallest structures.

What is the subscription price?

CyberDetection was designed to provide a cybersecurity solution for SMEs. Therefore, the subscription is affordable and will be adapted according to the size of your company and your security needs.

The subscription starts from 89 € HT / month*.

*For a VSE with commitment over 24 months and annual payment.

How long does it take to resolve a cyberattack ?

Given the lack of preparation of SMEs for cyberattacks, it has been calculated that it would take on average of 101 days to detect malicious activity on their server and that it takes on average of 46 days to resolve all problems related to a cyberattack, a huge waste of time and money!

Who are the most attacked people in a company ?

Heads are the most targeted by hackers. Then come sales executives, project managers, who usually have access to sensitive company information. Awareness of cyber threats is therefore not be neglected within your company!

Why do you use the term ''anticipation'' ?

CyberDetection detects threats early by monitoring "in the right place" and analyzing the event logs collected with a smart machine. And as the saying goes, "prevention is better than cure" and anticipating the attack is much easier than blocking it.

How are we alerted to a potential IT threat?

You are automatically alerted, 24 hours a day, 7 days a week via the medium of your choice: - By text message - By email - Via the dedicated mobile application on your smartphone

How can the 24/7 service work?

CyberDetection's intelligent machine is constantly working. A configuration of its alert system will allow you to contact the right person, by the right means (email, sms, application) depending on the time. CyberDetection trusts your usual technical contacts to answer the technical problems that you will encounter.

What should I do in the event of a cyber attack?

In the event of a cyber attack in progress, CyberDetection will provide you with information on the best solution (s) to take depending on the type of attack encountered.

What kinds of solutions are offered?

Each type of attack requires the execution of a computer procedure in order to close the point of vulnerability. CyberDetection will transmit at the time of the threat alert the procedure to be followed which is called here "solution".

CyberDetection monitors internal and external threats: but what are these threats?

- External threats: Ransomware, Cryptojacking, Fraud, Defacing, DDOS Attacks, Data Theft, Attacks Against Cloud Storage With Log Up, Information Theft, Intrusion, Session Theft, Video Camera Hacking, Geopolitical Attacks, Attacks on electronic medical devices and records, data destruction, malware 0 day. - Internal threats: accident, neglect, malice.

Why is it better to have an analysis, detection and alert server outside the client company?

CyberDetection with its analysis server and sending operating alerts outside the company system: - Makes the CyberDetection solution unassailable - Does not affect the performance of the client computer system - Does not use physical box to install on the client network - Keeps all traces thanks to an outsourced service

Why are we talking about a new generation of SIEM?

SIEM: security information and event management. It is the collection of events in real time, monitoring, correlation and analysis of events through disparate sources.

What is the Killchain principle used by CyberDetection?

Monitor in the right place, target where it is needed and what is needed. Companies are exhausting themselves from monitoring everything with monitoring, information that takes up a lot of space on the databases and there is therefore a greater chance of drowning in information than of finding relevant information. The idea of ​​the Kill Chain is therefore to understand each phase of the attack in order to better detect and counter it.

Why Cyber Detection is a third party / subcontractor who respects your GDPR data?

The data collected by CyberDetection are information system event logs and do not relate to the personal data of users and / or customers. The only information likely to be, thanks to cross-checking, considered as personal data was made anonymous at the time of archiving. The only data collected represents the user name and IP address.

What can I use data analysis reports for?

The compliance audit is a tool for assessing and diagnosing compliance with an established information security standard. The purpose of this tool is to verify the implementation of security practices by confronting them with the security requirements stemming from this repository and to identify deviations presenting the vulnerabilities of the audited system. The compliance audit allows you to verify its alignment with internal or external rules, or to control others on whether your rules are taken into account. CyberDetection generates data analysis reports which will be used for this audit.

How can CyberDetection monitor both external and internal threats?

CyberDetection isn't just about analyzing flows; All system events are analyzed in real time (24/24 and 7/7) to: - Raise abnormal system events (such as: adding an account to an administrator group, attempting to connect to a port USB, etc.) and understand the associated risks. - Respond to attacks from internal and risky users (e.g. a resigning user who wishes to steal your data before leaving, or delete your data). - Monitor file activities to protect against theft and data loss.

What are the costs of theft or loss of data following a cyber attack?

Cyberattacks represent a significant cost for all victimized companies.

According to Medef, 20% of the VSEs concerned have suffered damage greater than € 50,000.

For 13% of them, it even flies above € 100,000.

As for SMEs, the average financial cost of a cyber attack is estimated between 300 K € and 500K €.

In 59% of cases, this had very penalizing consequences: loss of turnover, late deliveries, slowing down or even stopping production...

Can the theft or loss of my data lead to the bankruptcy of my company?

In addition to operational risk, a cyber attack can now also have a significant legal cost, which is often underestimated. In fact, 60% of SMEs that have suffered a successful attack go bankrupt.

Will I have the possibility of permanently reaching a contact person if I encounter a technical problem?

CyberDetection trusts your usual technical contacts to answer the technical problems that you will encounter.

What kinds of solutions are offered?

Each type of attack requires the execution of a computer procedure in order to close the point of vulnerability. CyberDetection will transmit the procedure to be followed here called "solution" at the time of the threat alert. Generating a solution in the event of an alert is an additional option to the basic CyberDetection product.

What is 0 day malware?

0 day malware is a computer security hole kept confidential or known to a very small number of people.

What is a Ransomware?

it is malware that will take the personal data of a third party hostage.

What is the difference between a computer virus and a cyber threat?

Viruses are programs that penetrate computers in various ways to cause effects ranging from simple nuisance to serious and irreparable destruction. A cyber attack is a malicious act against a computer device via a cyber network. The forms are different, but the purposes are often the same.

Why is it better to have an analysis, detection and alert server outside the client company?

CyberDetection, with its server for analysis and sending of operating alerts outside the company system: - Makes CyberDetection solution unassailable - Does not affect the performance of the client computer system - Do not use a physical box to install on the client network - Keep all traces thanks to an outsourced service

Why CyberDetection is a disruptive solution?

CyberDetection detects threats in advance for: - Avoid that they cannot cause damage. - Protect against rapidly spreading threats. - React immediately and in a few seconds to give technicians the time necessary to intervene without interrupting your normal activity.


Logo blanc CyberDetection.png
  • LinkedIn Cyber Detection
  • Facebook Cyber Detection
  • Twitter Cyber Detection
  • Youtube CyberDetection

© 2020 by CyberDetection. Tous droits réservés. Politique de confidentialitéMentions légales.