Our cybersecurity resources

Make sure you are always up to date with the latest IT innovations and industry news. MCG is here to support you and shares its expertise with you in terms of the resources that are available to you free of charge.

Our latest news

The latest cyber-security information in a few clicks!

Cyber security in a few clicks!


 

The Cyber risk at the heart of all attention

The Cyber risk at the heart of all attention

2025 is a rather special year. On the one hand, it marks the start of the first period of compliance with the NIS2 directive. On the other hand, it will celebrate MCG's 25th anniversary.

In a quarter of a century, cyber threats have evolved at lightning speed. Let's take a look back at some key milestones.

Cyber risks - 3 critical trends for 2025

Cyber risks - 3 critical trends for 2025

Check Point Software's annual report is now available. Among all the information it contains, here are the 3 trends that particularly caught our eye.

Cybersecurity: the 3 key trends of the third quarter of 2024

Cybersecurity: the 3 key trends of the third quarter of 2024

With just a few weeks to go before the end of the year, a wave of major events and new trends has been fuelling cybersecurity news. Read on to find out about the three main issues that really caught our attention.

To stay informed of MCG news, the latest innovations and our solutions in terms of cybersecurity for your company, subscribe to our newsletter!

Useful resources

A selection of cyber-security resources to help your business


 

MCG Logo

Cybersecurity Links References

MCG has prepared a list of cyber-security reference links that you might like to consult.

Eight ways to respond to computer problems

What should I do if I think I’m being hacked? What should I do if I no longer trust my IT department? And what should I do if I receive too much spam in my company email inbox? MCG answers some of the questions you might have about cyber security at your organisation.

Discover
...
...

Tell us about your cybersecurity needs

Thank you for your message, we’ll contact you very soon! Fill all fields Error when creating request. Please try again
6Lcp1CAbAAAAAM-4iEYkG33vfIaUYODi6YEXTTqi