![](/typo3temp/assets/_processed_/3/7/csm_information_security_22_edc35cc9e9.webp)
Information security
Are you having connection problems? Do you think you’ve been the victim of a scam? We would like to remind you of the security measures that we all need to follow. Discover below the main risks of fraud.
![](/typo3temp/assets/_processed_/1/5/csm_Phishing_vignette_30_eb63dab6d6.webp)
Phishing
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information
Phishing: Fraudsters disguise themselves as a trustworthy entity in order to obtain sensitive information
![](/typo3temp/assets/_processed_/3/1/csm_vishing_vignette_20_7eec11a09e.webp)
Vishing
Vishing (voice phishing) is a phone call scam
Vishing (voice phishing) is a phone call scam
![](/typo3temp/assets/_processed_/3/7/csm_software_vignette_26_e4ad489366.webp)
Malicious software
Fraudsters contaminate your computer so they can hack your data
Fraudsters contaminate your computer so they can hack your data
![](/typo3temp/assets/_processed_/a/8/csm_Wifi_vignette_19_7ebb6b3693.webp)
WIFI technology
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...
Most Wi-Fi equipment manufacturers deliver routers that are configured for simple and rapid installation. This often...
![](/typo3temp/assets/_processed_/3/4/csm_good_practice_vignette_28_6f87abf1ca.webp)
Good practices to adopt