<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog Dattak</title>
    <link>https://www.dattak.io/en/blog</link>
    <description>Analyses, actualités et retours d'expérience sur la gestion des risques technologiques, les cyberattaques et les enjeux assurantiels.</description>
    <language>en</language>
    <pubDate>Thu, 23 Apr 2026 15:21:06 GMT</pubDate>
    <dc:date>2026-04-23T15:21:06Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>How to create and manage truly effective passwords</title>
      <link>https://www.dattak.io/en/blog/dattak-blog-bonnes-pratiques-mot-de-passe</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-bonnes-pratiques-mot-de-passe?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/motdepasse_3e988e4f5d-2.png" alt="How to create and manage truly effective passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The first barrier to protection: your password&lt;/h2&gt; 
&lt;p&gt;Whether it's for your mailbox, bank accounts or business access, your password is often &lt;strong&gt;the first line of defence against a cyber attack&lt;/strong&gt;. If it's weak, reused or too easy to guess, it becomes a vulnerability that hackers can exploit in a matter of seconds.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-bonnes-pratiques-mot-de-passe?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/motdepasse_3e988e4f5d-2.png" alt="How to create and manage truly effective passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The first barrier to protection: your password&lt;/h2&gt; 
&lt;p&gt;Whether it's for your mailbox, bank accounts or business access, your password is often &lt;strong&gt;the first line of defence against a cyber attack&lt;/strong&gt;. If it's weak, reused or too easy to guess, it becomes a vulnerability that hackers can exploit in a matter of seconds.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-blog-bonnes-pratiques-mot-de-passe&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:21:06 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-blog-bonnes-pratiques-mot-de-passe</guid>
      <dc:date>2026-04-23T15:21:06Z</dc:date>
      <dc:creator>Dattak</dc:creator>
    </item>
    <item>
      <title>Professional liability vs cyber insurance: why these products are different... and yet inseparable</title>
      <link>https://www.dattak.io/en/blog/dattak-blog-rcpro-vs-assurance-cyber</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-rcpro-vs-assurance-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/RC_Pro_assurance_cyber_bb02c764cf-2.png" alt="Professional liability vs cyber insurance: why these products are different... and yet inseparable" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Professional liability and cyber insurance: coverage with very different objectives&lt;/h2&gt; 
&lt;p&gt;&lt;strong&gt;Professional indemnity (RC Pro)&lt;/strong&gt; is a well-known form of cover for businesses. It covers &lt;strong&gt;damage caused to third parties&lt;/strong&gt; (customers, partners, suppliers) as a result of &lt;strong&gt;fault, error, negligence or lack of advice&lt;/strong&gt; in the course of professional activity.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-rcpro-vs-assurance-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/RC_Pro_assurance_cyber_bb02c764cf-2.png" alt="Professional liability vs cyber insurance: why these products are different... and yet inseparable" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Professional liability and cyber insurance: coverage with very different objectives&lt;/h2&gt; 
&lt;p&gt;&lt;strong&gt;Professional indemnity (RC Pro)&lt;/strong&gt; is a well-known form of cover for businesses. It covers &lt;strong&gt;damage caused to third parties&lt;/strong&gt; (customers, partners, suppliers) as a result of &lt;strong&gt;fault, error, negligence or lack of advice&lt;/strong&gt; in the course of professional activity.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-blog-rcpro-vs-assurance-cyber&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Assurance cyber</category>
      <pubDate>Thu, 23 Apr 2026 15:20:41 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-blog-rcpro-vs-assurance-cyber</guid>
      <dc:date>2026-04-23T15:20:41Z</dc:date>
      <dc:creator>Jérôme Gillet</dc:creator>
    </item>
    <item>
      <title>Cyberattacks - A look back at the first quarter of the year!</title>
      <link>https://www.dattak.io/en/blog/dattak-premier-trimestre-attaques</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-premier-trimestre-attaques?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11667703_20945550_b730cff52d-Mar-24-2026-04-58-53-1428-PM.webp" alt="Cyberattacks - A look back at the first quarter of the year!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The cyber threat at the start of the year&lt;/h2&gt; 
&lt;p&gt;Over the past few years, the cyber threat has grown to become a major concern for businesses and governments worldwide. The reasons for these increases are manifold, ranging from the proliferation of cybercriminal groups, to zero-day vulnerabilities and loopholes emerging along supply chains.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-premier-trimestre-attaques?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11667703_20945550_b730cff52d-Mar-24-2026-04-58-53-1428-PM.webp" alt="Cyberattacks - A look back at the first quarter of the year!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The cyber threat at the start of the year&lt;/h2&gt; 
&lt;p&gt;Over the past few years, the cyber threat has grown to become a major concern for businesses and governments worldwide. The reasons for these increases are manifold, ranging from the proliferation of cybercriminal groups, to zero-day vulnerabilities and loopholes emerging along supply chains.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-premier-trimestre-attaques&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cyberattaques</category>
      <pubDate>Thu, 23 Apr 2026 15:20:10 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-premier-trimestre-attaques</guid>
      <dc:date>2026-04-23T15:20:10Z</dc:date>
      <dc:creator>Benoit Beaulieu</dc:creator>
    </item>
    <item>
      <title>Cyber threats in healthcare systems</title>
      <link>https://www.dattak.io/en/blog/dattak-menace-cyber-sant%C3%A9</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-menace-cyber-sant%C3%A9?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11667703_20945550_b730cff52d-Mar-24-2026-04-58-53-1428-PM.webp" alt="Cyber threats in healthcare systems" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Cyber threats in healthcare systems&lt;/h2&gt; 
&lt;p&gt;Healthcare systems are increasingly dependent on technology to store and process patient information. This makes healthcare systems vulnerable to cyber attacks. These have increased in recent years, partly due to healthcare systems' heavy reliance on technology and the digitization of medical records.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-menace-cyber-sant%C3%A9?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11667703_20945550_b730cff52d-Mar-24-2026-04-58-53-1428-PM.webp" alt="Cyber threats in healthcare systems" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Cyber threats in healthcare systems&lt;/h2&gt; 
&lt;p&gt;Healthcare systems are increasingly dependent on technology to store and process patient information. This makes healthcare systems vulnerable to cyber attacks. These have increased in recent years, partly due to healthcare systems' heavy reliance on technology and the digitization of medical records.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-menace-cyber-sant%C3%A9&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:19:38 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-menace-cyber-sant%C3%A9</guid>
      <dc:date>2026-04-23T15:19:38Z</dc:date>
      <dc:creator>Benoit Beaulieu</dc:creator>
    </item>
    <item>
      <title>Protect your business and avoid legal consequences</title>
      <link>https://www.dattak.io/en/blog/dattak-protection-entreprise-prevention</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-protection-entreprise-prevention?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11669630_20943844_d187548006-2.webp" alt="Protect your business and avoid legal consequences" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber attacks have become a major threat to businesses, jeopardizing their sensitive data, reputation and financial situation. In addition to the technical and operational damage, the legal consequences of a cyber attack can be significant. It is essential for companies to take preventive measures to anticipate potential legal cases and minimize risks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-protection-entreprise-prevention?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11669630_20943844_d187548006-2.webp" alt="Protect your business and avoid legal consequences" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cyber attacks have become a major threat to businesses, jeopardizing their sensitive data, reputation and financial situation. In addition to the technical and operational damage, the legal consequences of a cyber attack can be significant. It is essential for companies to take preventive measures to anticipate potential legal cases and minimize risks.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-protection-entreprise-prevention&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:18:41 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-protection-entreprise-prevention</guid>
      <dc:date>2026-04-23T15:18:41Z</dc:date>
      <dc:creator>Benoit Beaulieu</dc:creator>
    </item>
    <item>
      <title>Webinar Dattak &amp;amp; Planète CSCA n°3</title>
      <link>https://www.dattak.io/en/blog/dattak-webinar-planete-csca</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-webinar-planete-csca?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11664263_20944805_66897eba52-2.webp" alt="Webinar Dattak &amp;amp;amp; Planète CSCA n°3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Webinar #3 - Everything you need to know about managing a cyber incident&lt;/h2&gt; 
&lt;p&gt;Our third webinar in partnership with &lt;strong&gt;PLANETE CSCA&lt;/strong&gt; was hosted by &lt;strong&gt;Benoit Grouchko, CEO and co-founder of Dattak&lt;/strong&gt;, and &lt;strong&gt;Thibaut Carré, cybersecurity director at Inquest&lt;/strong&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-webinar-planete-csca?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/11664263_20944805_66897eba52-2.webp" alt="Webinar Dattak &amp;amp;amp; Planète CSCA n°3" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Webinar #3 - Everything you need to know about managing a cyber incident&lt;/h2&gt; 
&lt;p&gt;Our third webinar in partnership with &lt;strong&gt;PLANETE CSCA&lt;/strong&gt; was hosted by &lt;strong&gt;Benoit Grouchko, CEO and co-founder of Dattak&lt;/strong&gt;, and &lt;strong&gt;Thibaut Carré, cybersecurity director at Inquest&lt;/strong&gt;.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-webinar-planete-csca&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:18:17 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-webinar-planete-csca</guid>
      <dc:date>2026-04-23T15:18:17Z</dc:date>
      <dc:creator>Benoit Beaulieu</dc:creator>
    </item>
    <item>
      <title>How much does a cyber attack cost? Dattak guides you with its loss estimator!</title>
      <link>https://www.dattak.io/en/blog/dattak-estimateur-de-pertes</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-estimateur-de-pertes?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/20945462_e112c4546f-2.webp" alt="How much does a cyber attack cost? Dattak guides you with its loss estimator!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;How much does a cyber attack cost? Dattak puts its expertise at your service to guide you with its loss estimator!&lt;/h3&gt; 
&lt;p&gt;When Dattak was launched at the end of 2021, one worrying fact was clear: many SMEs and SMBs were unaware of the cyber threats to their business. With this in mind, Dattak committed itself to raising awareness and educating the French business community about the crucial importance of cybersecurity.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-estimateur-de-pertes?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/20945462_e112c4546f-2.webp" alt="How much does a cyber attack cost? Dattak guides you with its loss estimator!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;How much does a cyber attack cost? Dattak puts its expertise at your service to guide you with its loss estimator!&lt;/h3&gt; 
&lt;p&gt;When Dattak was launched at the end of 2021, one worrying fact was clear: many SMEs and SMBs were unaware of the cyber threats to their business. With this in mind, Dattak committed itself to raising awareness and educating the French business community about the crucial importance of cybersecurity.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-estimateur-de-pertes&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Assurance cyber</category>
      <pubDate>Thu, 23 Apr 2026 15:17:23 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-estimateur-de-pertes</guid>
      <dc:date>2026-04-23T15:17:23Z</dc:date>
      <dc:creator>Benoit Beaulieu</dc:creator>
    </item>
    <item>
      <title>Cybersecurity for VSEs &amp;amp; SMEs</title>
      <link>https://www.dattak.io/en/blog/cybers%C3%A9curit%C3%A9-tpe-pme-cyberattaques-protection-assurance-cyber</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/cybers%C3%A9curit%C3%A9-tpe-pme-cyberattaques-protection-assurance-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/Cybersec_TPE_PME_Size_a19e2bfbac-Mar-24-2026-04-58-27-3550-PM.webp" alt="Cybersecurity for VSEs &amp;amp;amp; SMEs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Cybersecurity for small and medium-sized businesses&lt;/h2&gt; 
&lt;p&gt;Whatever the size of your business, digital technology is now part of our daily lives. But this transformation is accompanied by real risks that are steadily increasing, with the number of computer attacks rising dramatically. Data theft, ransomware, image damage and sabotage are just some of the risks weighing on organizations, often with serious and sometimes irreversible consequences.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/cybers%C3%A9curit%C3%A9-tpe-pme-cyberattaques-protection-assurance-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/Cybersec_TPE_PME_Size_a19e2bfbac-Mar-24-2026-04-58-27-3550-PM.webp" alt="Cybersecurity for VSEs &amp;amp;amp; SMEs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Cybersecurity for small and medium-sized businesses&lt;/h2&gt; 
&lt;p&gt;Whatever the size of your business, digital technology is now part of our daily lives. But this transformation is accompanied by real risks that are steadily increasing, with the number of computer attacks rising dramatically. Data theft, ransomware, image damage and sabotage are just some of the risks weighing on organizations, often with serious and sometimes irreversible consequences.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fcybers%C3%A9curit%C3%A9-tpe-pme-cyberattaques-protection-assurance-cyber&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:16:58 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/cybers%C3%A9curit%C3%A9-tpe-pme-cyberattaques-protection-assurance-cyber</guid>
      <dc:date>2026-04-23T15:16:58Z</dc:date>
      <dc:creator>Théophile Lapeyre</dc:creator>
    </item>
    <item>
      <title>Cloud security: Why regular scans have become indispensable</title>
      <link>https://www.dattak.io/en/blog/dattak-blog-securite-cloud-scans-reguliers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-securite-cloud-scans-reguliers?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/Scan_cloud_3040a03320-2.png" alt="Cloud security: Why regular scans have become indispensable" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The cloud: a revolution that exposes new risks&lt;/h2&gt; 
&lt;p&gt;The public cloud has established itself as the essential foundation of corporate IT infrastructures. Thanks to the cloud, organizations are gaining in agility, scalability and performance. But this agility has a downside: it makes security management more complex.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-securite-cloud-scans-reguliers?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/Scan_cloud_3040a03320-2.png" alt="Cloud security: Why regular scans have become indispensable" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The cloud: a revolution that exposes new risks&lt;/h2&gt; 
&lt;p&gt;The public cloud has established itself as the essential foundation of corporate IT infrastructures. Thanks to the cloud, organizations are gaining in agility, scalability and performance. But this agility has a downside: it makes security management more complex.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-blog-securite-cloud-scans-reguliers&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:16:08 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-blog-securite-cloud-scans-reguliers</guid>
      <dc:date>2026-04-23T15:16:08Z</dc:date>
      <dc:creator>Kévin Gouasbault</dc:creator>
    </item>
    <item>
      <title>Phishing: understanding the threat and protecting yourself effectively</title>
      <link>https://www.dattak.io/en/blog/dattak-blog-phishing-cybersecurite-bonnes-pratiques</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-phishing-cybersecurite-bonnes-pratiques?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/phising_74331bf080-2.png" alt="Phishing: understanding the threat and protecting yourself effectively" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;An omnipresent threat in our mailboxes&lt;/h2&gt; 
&lt;p&gt;Phishing is one of the most widespread methods of cyberattack worldwide. Behind this colourful term lies a simple but formidable technique: impersonate a trusted person or organization in order to trick the victim into providing sensitive information.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/blog/dattak-blog-phishing-cybersecurite-bonnes-pratiques?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/phising_74331bf080-2.png" alt="Phishing: understanding the threat and protecting yourself effectively" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;An omnipresent threat in our mailboxes&lt;/h2&gt; 
&lt;p&gt;Phishing is one of the most widespread methods of cyberattack worldwide. Behind this colourful term lies a simple but formidable technique: impersonate a trusted person or organization in order to trick the victim into providing sensitive information.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fblog%2Fdattak-blog-phishing-cybersecurite-bonnes-pratiques&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersécurité</category>
      <pubDate>Thu, 23 Apr 2026 15:15:01 GMT</pubDate>
      <guid>https://www.dattak.io/en/blog/dattak-blog-phishing-cybersecurite-bonnes-pratiques</guid>
      <dc:date>2026-04-23T15:15:01Z</dc:date>
      <dc:creator>Dattak</dc:creator>
    </item>
  </channel>
</rss>
