ZTNA as a Service: Guarantee business continuity in any situation If Covid-19 proved that allowing remote access to the information system was essential to the continuity of an organization’s activity, the multiplication of cyber attacks and the constant evolution of needs show the importance of ZTNA as a Service. ZTNA (Zero Trust Network Access) allows to secure remote access by applying the principle of least privilege. Its deployment as a cloud service allows it to adapt to the need for flexibility of companies that must deal with external constraints and… Read More >>
Remote maintenance: Which tools should you choose? Although remote maintenance is essential to the proper operation of organizations, it has certain cyber risks related to remote accesses. These risks can be reduced or even eliminated by using the right IT tools. Several solutions are commonly used for remote maintenance, such as remote-control software, VPNs, ZTNA (Zero Trust Network Access) or PAM (Privileged Access Management) solutions. However, these solutions are not equal in terms of cyber security. Remote maintenance: a performance challenge but also a cyber risk The… Read More >>
Remote Control Software: A Dangerous Practice in a Telework Situation Although not suitable for teleworking, remote control software is unfortunately one of the tools used by companies to allow their employees to access their office workstations from home, from a personal computer. The relatively simple use of remote control software has sometimes made the security risks associated with this type of product seem less important. Remote control software is intended for remote maintenance with a user responsible for initiating the connection and monitoring the actions performed and is therefore clearly… Read More >>
Data Breaches: Can We Avoid Them? Data breaches are one of the most feared events for companies, since they discredit the company’s ability to protect its confidential data, including the personal data of its customers. If computer attacks are to blame, these data breaches are also sometimes due to the company’s employees: in most cases, they come from a simple human error, but it can also be a case of data theft ordered to an employee by a competitor of the target company, or an employee… Read More >>
No Long-Term Telework Without Secure Remote Access Since the first lockdown, companies’ practices in terms of remote access have significantly evolved. It is now essential for organizations to make telework sustainable and institutionalized. While most organizations have implemented dedicated telework solutions and processes, many of them still do not have a real long-term telework strategy, which must combine ergonomics and security of remote access in any situation. A key issue for organizations The sustainability of teleworking has become a real issue for organizations, as teleworking has become… Read More >>
The new security perimeter for organizations Slowly but surely, we are experiencing a radical change in the world of networks and access security. To illustrate this in a caricatured way, we are moving from a situation when an organization’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. The networks of companies are now permanently installed in the Internet network via cloud infrastructures that go beyond the physical boundaries… Read More >>
Identity theft: how to protect against it within companies? Identity theft, which affects individuals in both personal and professional situations, is a threat whose impact is growing as the digital age expands in our lives. Although identity theft was not born with information technology, it is indeed the IT that has contributed to its expansion: on the one hand, more and more administrative procedures are carried out online, and on the other hand, our personal exchanges and confidential data are often poorly protected. Nevertheless, there are ways to protect… Read More >>
Teleworking: how to protect companies against the resurgence of cyber attacks 2020, already a difficult year from a health and economic point of view, will be a milestone in terms of cybercrime. Cyber attacks have multiplied, often exploiting vulnerabilities related to remote work. The first lockdown demonstrated the resilience of a large part of our companies, driven by dedicated IT teams whose sole objective was the impossible task of getting three million employees to telework… in just a few days. As a manager of a major French bank told me recently,… Read More >>
What measures should be implemented to secure teleworking? Today, more than ever, the way organizations manage to secure teleworking has an impact on the overall security of information systems. Teleworking is no longer a project or a temporary exception; it is now strongly anchored in organizations’ practices and represents an additional challenge for IT departments: it is no longer a question of being able to secure the remote accesses of certain employees on a temporary basis, but rather of being able to secure the remote accesses to the… Read More >>
How to secure the BYOPC? Widely democratized in recent months due to the unexpected and massive lockdown caused by the first wave of the Covid-19 epidemic, the BYOPC (Bring Your Own PC) concept is now becoming a real issue for the IT departments of organizations. For them, this practice provides as many organizational solutions as it generates security issues for the information system. While it is generally not recommended to let employees use their personal computers to access their organization’s applications and resources, today there… Read More >>