All stakeholders in the telecommunications and IT sector are concerned.

Graphic designer, Motion picture, video and television program production; sound recording and music editing, Programming and Broadcasting, Telephone operator, Telecommunications, Programming, consultancy and other IT activities, Mobile applications, information services

Cyber risks in the telecommunications and information sector

  • Provide critical communication services to businesses.

  • Among the least responsive in their management of cyber threats. *

  • 43% of telecom operators have been victims of malware exploiting the DNS.L

  • 81% of these organizations took at least three days to apply the security patch after being alerted of the vulnerability. *

  • 37% of mobile phone users were victims of attacks in 2018. **


Being the victim of a cyber attack is perhaps the worst thing that can happen to date to the telecommunications operators, whose marketing speeches rightly tout safe data transmissions. The same goes for IT companies.


* According to the DNS Threat Report 2018 published by EfficientIP

** According to a study by the specialized firm Kaspersky

Ensure the sustainability and continuity of the activity

According to the CNIL, it is the duty of each company to ensure the security of your customers' data in all circumstances and therefore:


  • Ensure the sustainability and continuity of the activity

  • Ensuring data protection

  • Ensure the protection of personal data

  • Ensure the protection & confidentiality of customer data

  • Protecting against abuse of privileges

  • Protect critical infrastructure

  • Secure online purchases and customer banking data

  • Ensure infrastructure protection

  • Preserving brand image and e-reputation

  • Interact securely

As many ambitions as risks in the face of cyber attacks!

Successful attacks

The Orange telecom group was the target of "computer intrusion" from the "My account" page in the customer area of the site. In total, 800,000 personal data were hacked, most of them names, first names, addresses, as well as telephone numbers.

Data security breach can have a big impact on business

  • Non-compliance with the GDPR: Legal & financial sanctions

  • Non-respect of confidentiality, therefore relationship of trust undermined with your customers

  • Financial impact: Data reconstitution costs, see final data loss if no efficient electronic archiving, additional operating costs (staff, use of external equipment ...), expert fees to identify the origin and the circumstances of a claim, recourse costs, cost of IT reconstruction, possible ransoms (Bitcoins> €)

  • Loss of activity, slowing down of production or even stopping production, delay in deliveries, therefore immediate loss of turnover

  • Damage to the image and reputation of the establishment

  • Relationship of trust shaken with customers

  • Loss of personal information

  • Website unavailability

To avoid becoming the weak link of your customers, the player in the telecommunications or IT sphere must know their risks and their adversaries, and this in order to be able to put in place the appropriate security tools: CyberDetection

Your quote

To allow us to send you your personalized quote , please select the box corresponding to your situation:

You are or already have a

Internal IT department or an IT maintenance company :

You do not have an internal department or IT company:

News in Telecommunication & Information sector (french)

Logo blanc CyberDetection.png
  • LinkedIn Cyber Detection
  • Facebook Cyber Detection
  • Twitter Cyber Detection
  • Youtube CyberDetection
+33 (0)4 69 96 80 08

© 2020 by CyberDetection. All rights reserved. Privacy policyLegal Notices.