Simplified and secure identity management: the keystone of your zero trust strategy How to secure the access of an employee working from home who uses a computer not controlled by the company, and who has access to your internal resources? With working form home employees accessing their applications located inside the company network, the usual protection offered by the company’s internal network (FireWall, VPN) is no longer sufficient. At the same time, how to secure access to applications for a group of employees whose rights are suddenly modified after a major change… Read More >>
Fake President fraud: a scam that takes advantage of the teleworking boom Like ransomware, the Fake President fraud has taken advantage of the massive telework due to the health crisis to take off again since 2020. While in the case of ransomware, remote access technologies unsuited to telework are to blame, in this case it is the lack of face-to-face social interaction that is one of the major causes of the increase in this type of scam. How does a fake president fraud work? In a fake president fraud, a swindler who… Read More >>
Identity management within Hospitals cluster The GHT (Hospitals cluster in France), created by the Health Act 2016, bring together several hospitals in the same region in order to strengthen their collaboration. This involves, in particular, a shared management of hospital staff, but also the gradual unification of the Information Systems (IS) of hospitals in the same hospitals cluster. Identity management is one of the first building blocks to be implemented as part of IS merge, which must then adapt to a multi-LE (multi legal entity) context…. Read More >>
The risks of Social Login You have seen it before, or even already used it to connect to a website, the social login seduces because of the simplification and time saving it provides to Internet users. This is a unique authentication form that allows users to connect to different sites or applications through identity providers, for example via their Facebook, Twitter, Google, Apple or LinkedIn accounts, to name just a few. Technically, behind the social login, there are identity federation technologies, which allow to use… Read More >>