Teleworking: how to protect companies against the resurgence of cyber attacks

2020, already a difficult year from a health and economic point of view, will be a milestone in terms of cybercrime. Cyber attacks have multiplied, often exploiting vulnerabilities related to remote work. The first lockdown demonstrated the resilience of a large part of our companies, driven by dedicated IT teams whose sole objective was the impossible task of getting three million employees to telework… in just a few days. As a manager of a major French bank told me recently,… Read More >>

Réseau d’administration

Administration network: 6 risks addressed by PAM

Within any organization, there are several risks for the administration network: some have a high occurrence and are simple to deal with, others are rare but complex to handle. The use of a Privileged Access Management (PAM) solution allows to manage these risks by minimizing or even eliminating them. Administration network: protean risks The risks that arise on the administration network can be the result of deliberate acts but also due to errors or negligence. From the use of generic… Read More >>

Sécuriser le télétravail - secure teleworking

What measures should be implemented to secure teleworking?

Today, more than ever, the way organizations manage to secure teleworking has an impact on the overall security of information systems. Teleworking is no longer a project or a temporary exception; it is now strongly anchored in organizations’ practices and represents an additional challenge for IT departments: it is no longer a question of being able to secure the remote accesses of certain employees on a temporary basis, but rather of being able to secure the remote accesses to the… Read More >>

Comment sécuriser le BYOPC

How to secure the BYOPC?

Widely democratized in recent months due to the unexpected and massive lockdown caused by the first wave of the Covid-19 epidemic, the BYOPC (Bring Your Own PC) concept is now becoming a real issue for the IT departments of organizations. For them, this practice provides as many organizational solutions as it generates security issues for the information system. While it is generally not recommended to let employees use their personal computers to access their organization’s applications and resources, today there… Read More >>

flex office

After teleworking, are we heading towards a democratization of flex office?

While telework has widely developed in organizations in 2020 due to the Covid-19 pandemic, flex office now appears as the next logical step in the reorganization of workspaces. Regular teleworking (for example one or two days a week) promotes a reorganization of offices: for the same number of employees, fewer workstations are necessary within the organization’s premises. What is the flex office? The flex office concept means that there is no dedicated office for each employee. When they are on… Read More >>

User Behavior Analytics (UBA)

User Behavior Analytics (UBA): key applications for cybersecurity

While User Behavior Analytics (UBA) is not a new concept, its applications are multiplying as Machine Learning becomes more mature. By associating Machine Learning and Big Data, UBA updates the patterns (reference models) and detects any deviation that is potentially dangerous for the information system. What is User Behavior Analytics? User Behavior Analytics is a category of applications that analyzes the user’s behavior and detects abnormal and potentially malicious actions. This behavioral analysis, which can be applied to all users,… Read More >>

Biométrie comportementale

Behavioral biometrics: A new authentication factor which needs to develop

Still marginal today, behavioral biometrics is already revolutionizing paradigms and authentication methods. By strengthening the security of information systems and making authentication more comfortable for users, this new factor is essential in the dynamic context created by today’s technological evolution and society. Indeed, the traditional password is becoming increasingly obsolete and used alone, it does not guarantee a sufficient level of security. Multi-factor authentication responds to this issue, with a trend towards the use of factors inherent to the user… Read More >>

OIV OSE

What are the regulations for OVI and OES?

The multiplication of attacks and threats to organizations’ information systems has prompted the French government and the European Union to implement recommendations and rules for private companies and public administrations. The requirement level of these rules and recommendations varies according to the importance of the target organization. They are optional for organizations considered as non-sensitive, but, at different levels, mandatory for OVI (Operators of Vital Importance) and OES (Operators of Essential Services). Limiting the cyber risk of OVI and OES… Read More >>

démocratisation du télétravail

6 advantages of the democratization of telework

Still very limited a few years ago, telework has taken a drastic yet salutary step forward for the large number of organizations that have used it: in many cases, it was the only way to maintain the economic activity without putting employees at risk of health hazards. This forced democratization of telework has proved to be beneficial in this period of health crisis, but it will also be beneficial in the future and in a much broader context than just… Read More >>

Secure Access Service Edge

Secure Access Service Edge: A Paradigm Shift

The network and network security world is experiencing, like any other technology, its digital revolution. The traditional vision of “inside the firewall” and “outside the firewall” has been shattered: Internet has become the network of the extended enterprise. Secure Access Service Edge: Trends Leading to a Paradigm Shift Moving from a “network-centric” architecture to a “user-centric” and “application-centric” architecture. On the one hand, the cloud and the decentralization of servers and applications in disparate clouds; on the other hand, the… Read More >>