VIDEO

- IT Security
7 Steps for advanced IT Security
Our IT security expert Michael Fedier talks about the 7 steps to take your IT security to the next level and how we do IT security consulting at Akana.
Michael is a very analytical and strategically thinking consultant who focuses on the long-term positive development of the customer. After studying business information systems, he mainly worked in the IT security sector in swiss banking. Through further training, such as the PMP certificate and the CISSP courses, he consolidated his project management and security experience in various projects, mostly with a regulatory background.
Thanks to his practical experience as an engineer at the beginning of his career, he actively works on projects. This not only helps with the implementation, but also with the strategic alignment, the development of a concept and the management of several project teams.
At Akana, he advises customers on digital strategy, helps as a project manager and engineer in the IT security area and successfully manages IT projects.
Our IT security expert Michael Fedier talks about the 7 steps to take your IT security to the next level and how we do IT security consulting at Akana.
Identity and access management (IAM) is the discipline to enable the right individuals to access the right IT resources, such as systems applications, files, and networks, at the right time for the right reasons. This often needs to be enabled across diverse technologies and the resulting processes must meet the security policies of the organization. The IAM system is a critical part of IT infrastructure of any larger organization.
Our way of working has been turned upside down by the corona virus. Companies had to offer their employees the opportunity to work from home in the shortest possible time. It was not only a challenge to provide the necessary infrastructure. Not infrequently, the necessary safety precautions were also neglected. Thanks to the home office, productivity can be maintained as much as possible. But the new way of working is susceptible to hackers who want to profit from the current situation.
Two-factor authentication (2FA) –or multi-factor authentication (MFA) in general – has grown in importance in security in recent years. This is about how users (employees and customers) authenticate to systems. Authentication by username and password is called 1FA. However, in order to increase safety, 2FA or MFA has been increasingly used in recent years.