Uncategorized – EZ-TFA.com L'authentification à double facteur simplifiée Fri, 17 May 2019 13:31:29 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.1 Using Multi-Factor Authentication /using-multi-factor-authentication/ /using-multi-factor-authentication/#respond Tue, 16 Apr 2019 19:05:39 +0000 /?p=11984 It is prudent to use multi-factor authentication as a means of ensuring that only legitimate users with sufficient permissions to your mission critical information and assets are the ones requesting the access. Multi-factor authentication (MFA) determines the credibility of a user through combining two or more forms of authentication. These could comprise any combination of [...]

The post Using Multi-Factor Authentication appeared first on EZ-TFA.com.

]]>
It is prudent to use multi-factor authentication as a means of ensuring that only legitimate users with sufficient permissions to your mission critical information and assets are the ones requesting the access. Multi-factor authentication (MFA) determines the credibility of a user through combining two or more forms of authentication. These could comprise any combination of what you know (correct username and password), what you have (a phone, a physical token), or what you are (a biometric such as a fingerprint). Two-factor authentication uses similar concepts with the difference being it only requires two things to authenticate a user. These factors are effective security controls since a cyber actor can hack a password and use it to access a system as someone else. MFA or 2FA prevents that from happening.

To be efficient, an MFA strategy must be able to pass the trojan test being: If a trusted user’s computer accessing your critical infrastructure has been infected by a trojan, will you be able to detect such threat and block the attacker?

Will the hacker be able to access the same sensitive information as the legitimate owner of the computer? Since a trojan give the hacker complete remote control of the computer and all its inherent security measures, it is critical to ensure that the legitimate user is the only one who can provide sufficient proof of his identity. Finally, a last question: Does validating the identity enough when giving access to information and systems? The choice of the correct MFA solution must answer to all of these questions and ensure that your information is protected against the most sophisticated threats.

Ez-TFA offers a range of solutions protecting your critical information from the infrastructure (physical or virtual), the environments (Windows or Linux) and the application levels (custom or SAAS).

The post Using Multi-Factor Authentication appeared first on EZ-TFA.com.

]]>
/using-multi-factor-authentication/feed/ 0
A risk-based approach /a-risk-based-approachnowadays-with-the-forever-evolving-cyber-threats-corporate-cyber-security-should-place-risk-management-at-the-heart-of-the-asset-protection-strategy-this-approach-enables-organ/ /a-risk-based-approachnowadays-with-the-forever-evolving-cyber-threats-corporate-cyber-security-should-place-risk-management-at-the-heart-of-the-asset-protection-strategy-this-approach-enables-organ/#respond Tue, 16 Apr 2019 18:59:44 +0000 /?p=11979 Nowadays, with the forever evolving cyber threats, corporate cyber security should place risk management at the heart of the asset protection strategy. This approach enables organization to optimize their cyber security investments and put their dollars where it really matters.  Identifying key systems and threats has a direct effect on the priorities of the investments. [...]

The post A risk-based approach appeared first on EZ-TFA.com.

]]>
Nowadays, with the forever evolving cyber threats, corporate cyber security should place risk management at the heart of the asset protection strategy. This approach enables organization to optimize their cyber security investments and put their dollars where it really matters.  Identifying key systems and threats has a direct effect on the priorities of the investments. Prioritizing risks is a key component of the strategy as it allows an organization to first mitigate those that pose the most serious threats before they can emanate to uncontainable attacks. Furthermore, this strategy allows the adoption of a preventive security approach whose aim is to stop threats rather than protect against an actual attack.

In order to be effective, a risk-based approach must be defined in a long-term cybersecurity strategy. It involves defining the corporate risk profile by performing a holistic assessment of all the current threats that all businesses must face a business and the vulnerabilities likely to impact the unauthorized access to its sensitive data. As stated previously, the continuous evolving threats can only be matched by a conscious shift towards risk-based approach to even the odds in a war that often feels lost before it begun. To build a solid risk-based strategy, organizations must have a sound understanding of their risk profile and key business processes, understand where mission critical and sensitive information are stored and their lifecycle. Assets and processes are then assigned a risk level ranging from low, medium, to high and risk levels.  This process is called an asset classification process. IT departments build disaster recovery plans using a similar process and organization must take this purely technological process to a more business level where both IT and business stakeholders identify critical assets based on the impact on confidentiality, integrity and availability throughout all the inventoried business processes.

Ez-TFA provides remote access governance solutions that will simplify the protection against risks associated to remote access to your critical assets while providing business aligned solutions rather then technical based solutions.

The post A risk-based approach appeared first on EZ-TFA.com.

]]>
/a-risk-based-approachnowadays-with-the-forever-evolving-cyber-threats-corporate-cyber-security-should-place-risk-management-at-the-heart-of-the-asset-protection-strategy-this-approach-enables-organ/feed/ 0
Securing the cloud /securing-the-cloud/ /securing-the-cloud/#respond Tue, 16 Apr 2019 18:52:59 +0000 /?p=11975 With the current digital transformation organizations are facing with the emergence of the cloud, it is crystal clear that soon every digital process will have a cloud-based component. Users are moving from on-site infrastructures and data centers to the cloud at a rapid rate, a factor which has been attributed to the numerous cloud benefits. [...]

The post Securing the cloud appeared first on EZ-TFA.com.

]]>
With the current digital transformation organizations are facing with the emergence of the cloud, it is crystal clear that soon every digital process will have a cloud-based component. Users are moving from on-site infrastructures and data centers to the cloud at a rapid rate, a factor which has been attributed to the numerous cloud benefits. Despite the advantages, the trending technology is riddled with multiple cybersecurity challenges that require clients to beef up their security processes if they hope to have a chance against the numerous cyber threats. These include insufficient access management controls, where any legitimate user infected with a trojan gives unconsciously full access to your sensitive information. This is a key example of what EZ-TFA provides to prevent unauthorized access.

Another example is the new challenges that come with the cloudification of assets. Knowing where the cloud assets are located, the corporate information they process and store, and the most suitable cyber security controls to deploy targeted without increasing the operational burden and over extending the cyber budget is a key success factor. Securing complex environment comprised of multiple environments such as Windows and Linux operating systems, in different clouds such as Google, Azure and AWS requires new cyber security strategies. This is due to the different sets of cyber threats and challenges that impact each operating system, thus necessitating the need for different controls. EZ-TFA understands those threats and provides cyber security solutions that help you protect your critical assets and information, on site or in the cloud.

The post Securing the cloud appeared first on EZ-TFA.com.

]]>
/securing-the-cloud/feed/ 0