Fuites de données

Data Breaches: Can We Avoid Them?

Data breaches are one of the most feared events for companies, since they discredit the company’s ability to protect its confidential data, including the personal data of its customers. If computer attacks are to blame, these data breaches are also sometimes due to the company’s employees: in most cases, they come from a simple human error, but it can also be a case of data theft ordered to an employee by a competitor of the target company, or an employee… Read More >>

Comment lutter contre le shadow admin ?

How to Fight Against Shadow Admin?

When it comes to privileged accounts, traceability is essential, but it is sometimes compromised by the use of shadow admin. This traceability, as well as real-time or a posteriori control of the administration actions allowed by the PAM (Privileged Access Management) should however be exhaustive to effectively protect the information system…. Read More >>

Pas de pérennisation du télétravail sans sécurisation des accès distants

No Long-Term Telework Without Secure Remote Access

Since the first lockdown, companies’ practices in terms of remote access have significantly evolved. It is now essential for organizations to make telework sustainable and institutionalized. While most organizations have implemented dedicated telework solutions and processes, many of them still do not have a real long-term telework strategy, which must combine ergonomics and security of remote access in any situation. A key issue for organizations The sustainability of teleworking has become a real issue for organizations, as teleworking has become… Read More >>

security perimeter

The new security perimeter for organizations

Slowly but surely, we are experiencing a radical change in the world of networks and access security. To illustrate this in a caricatured way, we are moving from a situation when an organization’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. The networks of companies are now permanently installed in the Internet network via cloud infrastructures that go beyond the physical boundaries… Read More >>

Rançongiciel as a Service (RaaS), le nouveau virus de l’année 2021 ?

Ransomware as a Service (RaaS), the new virus of 2021?

The beginning of 2021 will be marked not by a wave, but by a large number of cyberattacks that will hit many organizations in France. For the past few years, the ANSSI (French National Cybersecurity Agency) has been warning companies and institutions about the resurgence of cyber viruses. In the CERT-FR Threats and Incidents report, it states a dramatic 255% increase in reports of ransomware attacks in 2020 and highlights Ransomware as a Service, RaaS, an emerging trend in the… Read More >>

Enjeux RH télétravail

HR issues of telework

While the democratization of telework concerns different departments within companies, Human Resources is probably, together with the IT Department, the department whose activity has been the most impacted by telework, with new HR issues arising from this digitalization of interactions. From 100% online recruitment processes to the need to maintain social contact between all employees remotely, and to manage the work/life balance, Human Resources must, more than ever, prove their ingenuity and rely on digital tools to support these new… Read More >>

usurpation d'identité

Identity theft: how to protect against it within companies?

Identity theft, which affects individuals in both personal and professional situations, is a threat whose impact is growing as the digital age expands in our lives. Although identity theft was not born with information technology, it is indeed the IT that has contributed to its expansion: on the one hand, more and more administrative procedures are carried out online, and on the other hand, our personal exchanges and confidential data are often poorly protected. Nevertheless, there are ways to protect… Read More >>

PAM-as-a-Service

PAM as a Service: Privileged Access Management for everyone?

The protection of information systems requires the deployment of a PAM (Privileged Access Management) solution for the surveillance of privileged users, which if deployed on-premise, may be too restrictive to implement for some organizations. In this context, PAM as a Service, or Privileged Access Management as a public cloud service, will be a guarantee of simplicity for the IT teams involved. From a deployment in a few clicks to the guarantee of regular and automatic updates, PAM as a Service… Read More >>

Teleworking: how to protect companies against the resurgence of cyber attacks

2020, already a difficult year from a health and economic point of view, will be a milestone in terms of cybercrime. Cyber attacks have multiplied, often exploiting vulnerabilities related to remote work. The first lockdown demonstrated the resilience of a large part of our companies, driven by dedicated IT teams whose sole objective was the impossible task of getting three million employees to telework… in just a few days. As a manager of a major French bank told me recently,… Read More >>

Réseau d’administration

Administration network: 6 risks addressed by PAM

Within any organization, there are several risks for the administration network: some have a high occurrence and are simple to deal with, others are rare but complex to handle. The use of a Privileged Access Management (PAM) solution allows to manage these risks by minimizing or even eliminating them. Administration network: protean risks The risks that arise on the administration network can be the result of deliberate acts but also due to errors or negligence. From the use of generic… Read More >>