Frequent Asked Questions

FAQ

Cybersecurity and IT Protection

Our MDR team responds within 30 minutes to detected attacks, mitigating damage and initiating the necessary countermeasures. This swift intervention is crucial in limiting the impact of potential breaches.

We continuously test the effectiveness of our defenses through actions such as:
■ Phishing attack simulations
■ Weekly testing of our services to verify their effectiveness
■ Vulnerability assessments on networks and applications

The Managed Detection and Response (MDR) combines 24/7 monitoring with XDR technologies and attack response within 30 minutes. It ensures proactive defense against ransomware and phishing, analyzing 100% of alerts through dedicated analysts. 

The Centurio Platform is an integrated solution that fully covers the main corporate cybersecurity needs. It consists of three key components:

■ MDR (Managed Detection and Response)
■ NOC (Network Operation Center)
■ CSG (Communication Security Gateway)

Providing comprehensive protection against digital threats.

Our Patch Management service proactively manages patches and vulnerabilities, an aspect often overlooked by companies and competitors who only respond to incidents after they occur. This preventive approach significantly reduces the risk of exploitation of vulnerabilities.

We reduce infrastructure costs by 50% through proactive optimizations, monitor backups, and ensure system status with preventive fault detection.

With the Communication Security Gateway (CSG): we block 99.9% of phishing attacks, manage SPF/DKIM/DMARC authentication, and archive communications for 10 years in compliance with GDPR regulations.

We conduct phishing scenario simulations to assess employees’ readiness to recognize and respond to threats. This proactive approach helps identify vulnerability areas and improve security training.

The main cyber risks for businesses are multiple, including:

EVOLVED RANSOMWARE ATTACKS
Ransomware is becoming increasingly sophisticated, with double or triple extortion techniques that include the threat of disclosing sensitive data.

INSIDER THREATS
Disgruntled or malicious employees, or even those who are unaware, pose a significant risk to the security of corporate information.

SUPPLY CHAIN VULNERABILITIES
Targeting suppliers or partners to access business systems is a strategy increasingly used by hackers.

PHISHING AND SOCIAL ENGINEERING
Advanced social engineering techniques use artificial intelligence to create highly personalized phishing attacks.

UNSECURE IOT DEVICES
With the rise of IoT devices in businesses, vulnerabilities in these devices can be exploited as an access point for attacks.

CYBERATTACKS AGAINST CRITICAL INFRASTRUCTURE
Sectors like energy, healthcare, and transportation remain priority targets for cybercriminal groups and state actors.

CLOUD SECURITY GAPS
Configuration errors and unauthorized access to cloud systems increase the risk of exposing sensitive data.

NON-COMPLIANCE WITH REGULATIONS
Companies that fail to comply with regulations such as NIS2, DORA, or GDPR risk heavy fines in the event of a breach.

ZERO-DAY THREATS
Vulnerabilities not yet known to software vendors are increasingly exploited for targeted attacks.

DATA COMPROMISED ON THE DARK WEB
Information stolen in previous breaches can be used for subsequent attacks.

LACK OF A SECURITY CULTURE
The absence of awareness and employee training makes companies more vulnerable to attacks.

Compliance and Regulations

If you operate in critical sectors such as energy, transportation, or healthcare, your company is likely subject to the NIS2 Directive, but many other sectors are also included. We offer audits to verify compliance and avoid penalties of up to 2% of turnover.

We offer specialized consulting to help companies implement the measures required by the NIS2 Directive. Our approach includes compliance assessments, the implementation of security measures, and ongoing support to avoid penalties.

Non-compliance with cybersecurity and data protection regulations, such as NIS2, DORA, and GDPR, can result in serious consequences for a company, including:

FINANCIAL PENALTIES
Violations can lead to fines of up to 2% of global annual turnover under NIS2, while GDPR fines can reach up to 20 million euros or 4% of turnover.

LEGAL LIABILITY
Executives may be held directly accountable for non-compliance, with potential legal actions.

REPUTATIONAL DAMAGE
A non-compliant company risks losing the trust of customers and partners, leading to negative impacts on business.

FACILITATED CYBERATTACKS
Regulations like NIS2 and DORA impose high security standards; failure to implement these measures exposes the company to cyber threats.

OPERATIONAL SHUTDOWN
In some cases, the regulatory authority may suspend the company’s activities until security issues are resolved.

To avoid these risks, a compliance audit and proactive implementation of the required security measures are essential.

Yes, our agency provides real-time monitoring for:

■ Backup integrity
■ Server and network health
■ Endpoint security

IT Management and Infrastructure

The Centurio Platform includes:
■ Advanced protection for SharePoint and Teams
■ DLP (Data Loss Prevention) for OneDrive
■ Continuous audit of security settings
■ Monitoring of on-premise and cloud data

Our services are particularly suited for companies with complex infrastructures. Through MDR, NOC, and CSG, we are able to keep company data and communications secure.

By integrating these with specialized consulting from Centurio Project, we can help companies manage complex projects and optimize security strategically.

We manage vulnerabilities through continuous updates and by performing Vulnerability Assessments to check the overall status of the infrastructure.

We offer a fast assistance service:
■ 30 minutes for attack containment (contractual SLA)
■ 24/7 or 9×6 technical support

Partnerships and Collaborations

We collaborate with industry leaders such as Microsoft, SentinelOne, Proofpoint, and Mimecast to provide cutting-edge security solutions to our clients.

Categories