GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

How to Stay on Track

globalresearchsyndicate by globalresearchsyndicate
February 7, 2020
in Data Collection
0
How to Stay on Track
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

FavoriteLoadingAdd to favorites

“Whatever you do, don’t rely on homegrown solutions like spreadsheets as some people still do. In 2020!”

Managing your company’s security posture can be daunting at times. But given the new reality of ransomware, phishing, deep fakes and other advanced identity attacks, it’s critical that strong identification and authentication controls are in place for both humans and machines so that there is no chance of impersonation, fraud or man-in-the-middle attacks, writes GlobalSign CISO, Arvid Vermote.

From a CISO’s perspective, there is a great deal to consider. But among the many critical security steps needed for any organization is the proper management of your company’s identification and authentication processes. The best means to achieve this is using a public key infrastructure (PKI), which allows you to issue certificates to both users and machines for authentication, identification and encryption.

GlobalSign CISO, Arvid Vermote

In terms of machines SSL/TLS certificate(s) confirming the identity of IT services, authentication certificates are used for machines to talk to each other, and code signing certificates make sure software and binaries are legitimate, and not malware.

Users employ certificates for authentication towards corporate services, signing documents and signing e-mails so that recipients do not need to doubt ,the sender’s identity and authenticity of any message. New technologies like the Virtual Smart Card (VSC) on Microsoft Windows provide an excellent mechanism for seamless and centralized certificate-based identification and strong authentication.

Not only is it important to make sure every human and machine within your company possesses a certificate so it is identifiable, but also to properly manage the lifecycle of those certificates. A very recent example about why certificate lifecycle management is so important is Microsoft Teams. In early February the popular product experienced an unfortunate incident where an authentication certificate expired. This caused the service to be unavailable for at least three hours, leaving its users around the world unable to login to their Microsoft Teams environment.

See also: Microsoft Teams Takes a Tumble after Cert Expires

Reality is Microsoft is certainly not the only entity to suffer the consequences of a forgotten certificate renewal. In the last several years, LinkedIn, Pokemon Go, the UK’s Conservative Party, and even The White House, all experienced episodes of certificate expiry and consequent unavailability of their services.

Not only are outages highly inconvenient, but they can have a real cost in terms of productivity. Without a valid certificate, data can’t be sent as identity between sender and recipient cannot be confirmed.

Perhaps some will take this with a grain of salt as I am the CISO for a certificate company. However, I assure you my suggestions below will help you better manage your certificates no matter what type of certificate authority scenario you currently have in place. Right off the top, you definitely don’t want to let your certificates expire. But what can you do to prevent it from happening at all?

Here are some tips:

Certificate Management: Some Tips to Stop Certificates Expiring 

> Do regularly run complete certificate inventories. You might think you have a handle on all your certificates – you’re using your CAs management portal, getting email alerts, maybe even syncing your renewal periods – when, bam, you learn that some random certificate expired and now everyone’s blaming you. Doing a full scan of both your public and internal networks makes you aware of everything you’re working with so you can be prepared for when that random certificate someone from the dev teamed ordered is up for renewal.

> Do leverage your CA’s certificate management portal. Most CAs offer some kind of management interface where you can see all certificates you have ordered from them and filter for upcoming expirations. And if yours doesn’t perhaps it’s time to check out other options.

> Do check the email address tied to your certificates. You should be sure you have email reminders set up by default which are periodically sent as a certificate’s expiration date approaches. However, these reminders won’t be much use if the emails are never or rarely checked.

> Do use a fully automated, managed PKI solution for certificate provisioning and management. You should be able to easily issue and manage your publicly trusted certificates throughout their life cycle, including renewal, saving valuable IT resources and reducing the risks of having expired certificates.

> Do work with a CA that offers you ease of use to control your certificate needs with the click of a button. Also be sure your CA offers support for multiple business entities and departments under one umbrella account.

> But whatever you do, don’t rely on homegrown solutions like spreadsheets as some people still do. In 2020! The potential issues with this method are stressful just to think about because they are very risky. Someone could forget to update a file, or someone could accidently overwrite it with incorrect information. Or worse, what if your system crashes and you lose everything? That said, it is strongly recommended you find a modern solution to manage your certificates.

Even in a mature IT and security organization it is likely that employees lose track of all the keys and certificates if manually manage. By following these guidelines and automating certificate management your organization will be ahead of the gam

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Kantar buys Colmar Brunton and unifies its ANZ brand

Kantar buys Colmar Brunton and unifies its ANZ brand

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com