Simplified and secure identity management: the keystone of your zero trust strategy How to secure the access of an employee working from home who uses a computer not controlled by the company, and who has access to your internal resources? With working form home employees accessing their applications located inside the company network, the usual protection offered by the company’s internal network (FireWall, VPN) is no longer sufficient. At the same time, how to secure access to applications for a group of employees whose rights are suddenly modified after a major change… Read More >>
Remote maintenance: Which tools should you choose? Although remote maintenance is essential to the proper operation of organizations, it has certain cyber risks related to remote accesses. These risks can be reduced or even eliminated by using the right IT tools. Several solutions are commonly used for remote maintenance, such as remote-control software, VPNs, ZTNA (Zero Trust Network Access) or PAM (Privileged Access Management) solutions. However, these solutions are not equal in terms of cyber security. Remote maintenance: a performance challenge but also a cyber risk The… Read More >>
Fake President fraud: a scam that takes advantage of the teleworking boom Like ransomware, the Fake President fraud has taken advantage of the massive telework due to the health crisis to take off again since 2020. While in the case of ransomware, remote access technologies unsuited to telework are to blame, in this case it is the lack of face-to-face social interaction that is one of the major causes of the increase in this type of scam. How does a fake president fraud work? In a fake president fraud, a swindler who… Read More >>
Remote Control Software: A Dangerous Practice in a Telework Situation Although not suitable for teleworking, remote control software is unfortunately one of the tools used by companies to allow their employees to access their office workstations from home, from a personal computer. The relatively simple use of remote control software has sometimes made the security risks associated with this type of product seem less important. Remote control software is intended for remote maintenance with a user responsible for initiating the connection and monitoring the actions performed and is therefore clearly… Read More >>
Data Breaches: Can We Avoid Them? Data breaches are one of the most feared events for companies, since they discredit the company’s ability to protect its confidential data, including the personal data of its customers. If computer attacks are to blame, these data breaches are also sometimes due to the company’s employees: in most cases, they come from a simple human error, but it can also be a case of data theft ordered to an employee by a competitor of the target company, or an employee… Read More >>
How to Fight Against Shadow Admin? When it comes to privileged accounts, traceability is essential, but it is sometimes compromised by the use of shadow admin. This traceability, as well as real-time or a posteriori control of the administration actions allowed by the PAM (Privileged Access Management) should however be exhaustive to effectively protect the information system…. Read More >>
No Long-Term Telework Without Secure Remote Access Since the first lockdown, companies’ practices in terms of remote access have significantly evolved. It is now essential for organizations to make telework sustainable and institutionalized. While most organizations have implemented dedicated telework solutions and processes, many of them still do not have a real long-term telework strategy, which must combine ergonomics and security of remote access in any situation. A key issue for organizations The sustainability of teleworking has become a real issue for organizations, as teleworking has become… Read More >>
Identity theft: how to protect against it within companies? Identity theft, which affects individuals in both personal and professional situations, is a threat whose impact is growing as the digital age expands in our lives. Although identity theft was not born with information technology, it is indeed the IT that has contributed to its expansion: on the one hand, more and more administrative procedures are carried out online, and on the other hand, our personal exchanges and confidential data are often poorly protected. Nevertheless, there are ways to protect… Read More >>
6 advantages of the democratization of telework Still very limited a few years ago, telework has taken a drastic yet salutary step forward for the large number of organizations that have used it: in many cases, it was the only way to maintain the economic activity without putting employees at risk of health hazards. This forced democratization of telework has proved to be beneficial in this period of health crisis, but it will also be beneficial in the future and in a much broader context than just… Read More >>
Covid-19: the forgotten side of teleworking A few days ago, a survey conducted by Odoxa-Adviso Partners estimated that there are 5.1 million people teleworking in France during this period of covid-19 health crisis. This means that 3.3 million employees have the possibility to work remotely, in addition to the 1.8 million who already occasionally had this possibility before. This flexibility is excellent news for our economy because it allows us to maintain part of the nation’s productive force, and also to save a few billion in… Read More >>