How to securely provide credentials to remote workers? - A case study from Cypherdog
Przemys?aw Kucharzewski
Channel Sales | Business Development | Partnerships | Sales | Cybersecurity | Offensive Security as a Service | Vulnerability Management | MFA | 2FA | ITSM | SAM | ITAM | IAM | NIS2 | DORA
The Romanian tech company offers a lead generation platform for its customers. Most of its employees, nearly 50 people, from the Business Development, Customer Service, Marketing and Sales Departments work remotely from different countries on different continents.
Employees use a variety of SaaS tools that allow them to work efficiently, e.g., Slack platform for communication in teams, CRM system, tools for arranging meetings, calendar, e-mail, chat applications on the company website, Canva for graphic editing of files, Google Drive, and other tools.
The second group of the company’s associates are developers, testers, project managers and DevOps. They also work remotely and must have access to all tools, repositories, and servers necessary for software development.
Most employees use their own laptops — BYOD has become so popular that everyone wants to work on the hardware that suits them, and the internet connection is not always 100% secure.
The beginning of the employee adaptation process is the creation of a workplace and the granting of all rights to many tools. The second important element is granting permissions to repositories containing application code, access to servers and services for DevOps.
领英推荐
Can you imagine what could happen if, for example, a hacker had access to the servers where the application is running and disabled it, or could steal customer databases with e-mails, using them later for a phishing attack?
Now all logins and passwords are sent encrypted. The company uses the full license of Cypherdog E-mail Encryption only by IT Administrators and employees use the free version (for decryption only).
Watch a video on how to encrypt your e-mail with Cypherdog E-mail Encryption.
Key Account Manager at Advatech Sp. z o.o.
2 年Cypherdog is the best tool to encrypt Yours precious knowledge. Take care of Your data.
Channel Sales | Business Development | Partnerships | Sales | Cybersecurity | Offensive Security as a Service | Vulnerability Management | MFA | 2FA | ITSM | SAM | ITAM | IAM | NIS2 | DORA
2 年Very often credentials are most often sent simply by email, and not infrequently to mailboxes we "know nothing about." And these are access credentials not only to a minor service, but, for example, to production servers.