Surface of a cyberattack on an individual, a family, a family office, a SME,
motivations of cybercriminals and concrete examples, good practices, practical
cases and examples of everyday life, technological solutions that are easy to
install and use, how to react in case of danger or attack, your role with regards
to your IT service provider or IT manager.