Telecommuting and Remote Access: First results of your cybersecurity levels

Published on

We have recently launched an offering to help organizations assess their remote access security and cyber exposure through

  • A mapping of declared components and discovery of potential additional components
  • An extended security scan of each component with the PatrOwl solution
  • A one-hour workshop on cybersecurity practices related to telecommuting (ANSSI / ISO 21827 SSI maturity, CNIL advice, set of additional questions by GreenLock Advisory experts) Here are the first anonymized results of 9 companies that accepted this publication:

A quick analysis of these results leads to the following observations:

  • Smaller companies, more flexible, more outsourced in the cloud, are better framed by the SaaS solutions they mostly use but lack the application of classic good practices
  • Companies with critical stakes and aligned budgets have no particular problems (which amounts to saying that companies with large budgets and high cybersecurity maturity are... mature in cybersecurity 😄)
  • Many underestimated bandwidth consumption with potential impact on hosted services for their customers
  • Companies with information systems that have not evolved much in the past several years are struggling to move to all telework and lack control over their information systems

Blog: Fortigate CVE-2023-27997 (XORtigate) in the eyes of the owl

The arbitrary Top of the past year 2022

KeePass, ultra-mega-giga critical vulnerability 🤦‍♂️

Let's keep in touch

Subscribe to our newsletter