Mobile Threat Defense Guide 2018

Our highly digital world has fundamentally changed companies’ organization. Smartphones and tablets are now at the center of our personal and professional usages, with an average of 5 hours per day spent on them. In constant demand of immediacy, the new employee is mobile, flexible and always connected. In the last decade, organizations have whether equipped themselves with corporate mobile devices…

Supply Chain Management and Supply Chain Security: Addressing Vulnerabilities with PAM

Supply chains are essential for the proper functioning of industrial systems and critical infrastructure. However, they’re also quite messy, in terms of security. Supply chains invariably connect users and systems from multiple entities, often in different countries. This setup exposes every company in the supply chain to cyber risk. Among countermeasures, Privileged Access Management (PAM) offers one of the best ways of…

Summary of the most jaw-dropping ransomware on the planet

Having been highly publicised and popularised after the WannCry and NotPetya incidents, ransomware is now squarely in the public domain. Forbes France Magazine even suggests that 20,000 computers a month are infected with malicious software in France. But did you know that there are ransoms and, well, ransoms? A summary of the most surprising ransomware of the past few years.…

Small businesses and cyber-attacks: the 10 most common threats

  Connected but often with little protection, small businesses are manna from heaven for cyber-criminals and hackers. E-mails, wifi network, USB keys, etc. Discover the 10 most common entry points in micro, small and medium-sized businesses*. 1- E-mail E-mail is undoubtedly the most common means by which to be hacked. A malicious attachment is often the preferred vector for phishing…

This Banking Institution Prevents Mobile Fraud With Pradeo Security

Banks have digitalized their services to offer the best experience to their clients. As a result, it is now of current use to check accounts and transfer money from mobile banking applications, arousing the interest of hackers to exploit the wide mobile attack surface. Facing this new vector of threats, the Bank to which this use case refers decided to…

Micro businesses and IT security: an inventory of the main protection solutions

  For many small business, financial restrictions might justify neglecting IT protection equipment. This is a risky strategy as long as micro businesses and SMEs are exposed to cyber-threats. Especially as there is a whole arsenal of effective solutions that are adapted to their budget. Like in any company, small business IT security starts with making employees aware of best practice: operating…

All eyes on us: 4-Eyes Session Monitoring

IT security has never been so important, as hacks and data breaches are at an all-time high (and climbing). When it comes to the security of your data and infrastructure, visibility and control are paramount. You can put in place all manner of corporate policies and password rules, but oversight of administrator actions and the ability to review past activity…

PAM to the Rescue: 3 Common Security Scenarios

Despite the globally-increasing threat of cyber attack, and what feels like near-daily major news reports of data breaches in our most sensitive industries, many companies still under-value cybersecurity. While the data breach fatigue is real, organizations from every sector need to ramp up their IT security practices. Not convinced? Here are 3 common scenarios where IT security is at risk, and how…

Cybersecurity Simplified: Security is Nothing Without Control

When talking about Privileged Access Management, it’s important to focus on the real objective: to ensure that only the right person can access the right system at any given time. A password vault can easily handle that, but you really need more. It’s far more important to ensure that when someone accesses a target, this person does only what they…

Qualified security solutions: choosing a trusted solution

How much do you trust the security solution that protects your information system? It's a key question, but one that isn't asked often enough. Whether you're a business or a government body, you need complete confidence in the solution that's there to protect you. What's the use of rolling out a security product if it's inefficient... or worse, if it…