Benoit Voirin
Benoit Voirin
Benoit Voirin is a freelance Cyber Security consultant with 10 years of experience in Cyber Strategy, infrastructure project management and IT System Engineering. Benoit has a wild range of skills in cyber security strategy and technical domains gained by working on vast and challenging projects in multiple domains and sectors. He is certified ISO 27001 Lead Implementer, Cloud Security Knowledge (from Cloud Security Alliance), Prince 2 and ITIL.

All posts by Benoit Voirin

Posted by Benoit Voirin on June 30, 2022
How to secure data in the cloud?

The topic of cybersecurity can be overloaded, especially when it comes to cloud. That’s why, when things get too loud, it’s good to return to the basics. Knowing the most common threats to cloud storage and the established strategies to deal with them will make a good foundation for building your own data security.

Learn More

Posted by Benoit Voirin on October 26, 2021
Identity as a Service (IDaaS)

IDaaS offers the benefits of hybrid IT by providing cloud-based Identity and Access Management (IAM). The service ensures that users are who they claim to be, and provides them with appropriate access to specific resources at a proper time. It’s maintained by the service provider and needs little resources or effort to jumpstart.

Learn More

Posted by Benoit Voirin on June 24, 2021
How to Increase Security in Remote Work Conditions Using Mobile Device Management

Having unmanaged remote endpoints, overall, and in remote work specifically, can lead to unauthorized data access, data leakage, or even worse security compromise cases. Mobile Device Management solutions will allow you to tailor security policies, push security policies, settings and software on your employee remote-access devices, and identify potential vulnerabilities.

Learn More

Posted by Benoit Voirin on March 2, 2021
Assessing Your Active Directory

Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.

Learn More

Posted by Benoit Voirin on October 22, 2020
Identity and Access Management (IAM) in a nutshell

It’s a misconception that only a hacker attack is the biggest threat to cybersecurity. In reality, employees not abiding by basic security protocols during their routine work is the biggest “backdoor.” Making sure that all roles, privileges, and systems are set to avoid any outside access is paramount for ensuring your company’s solid daily cybersecurity.

Learn More

Posted by Benoit Voirin on August 13, 2020
Email and Web Browser protection

If your browsers and email aren’t secured properly, then your network and users aren’t either. Properly securing your organization’s daily browsing activity can hinder the majority of cybersecurity compromisation cases. Issues like filtering, sender policy framework (SPF), browser types and browsing limitations are all detrimental.

Learn More

Posted by Benoit Voirin on March 12, 2020
How to Use Snyk to Scan Images for Vulnerabilities

When people think “cybersecurity,” images will be the last thing to come to mind. Usually, users tend to focus on things like cyber-attacks, viruses, or malware. Well, regular images, depending on where they come from, their integrity, and the routing can become a micro-gap in your security which can then result in a breach.

Learn More

Posted by Benoit Voirin on February 18, 2020
Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.

Learn More

Posted by Benoit Voirin on November 28, 2019
Cyber Security – Where to Start – Part 2

If the previous part, you read about general boundaries of cybersecurity and why it’s mandatory to uphold. Continuing the topic, the initial steps to ensuring your business is cyber-secure, you need to create a solid foundation. Baseline OS security tools have to be configured and active 24/7, and much success of cybersecurity depends on educating your staff.

Learn More

Posted by Benoit Voirin on October 22, 2019
Hardening Linux: Essential Steps for Boosting Linux Server Cybersecurity

We often tend to believe that operating systems are secured by default, but securing your Linux servers to protect your data, intellectual property and time is the responsibility of the system administrator.

In this post we will review some of the basics operations that shall always be done while installing a new Linux server. We will use Debian as an example for the different commands but finding the rights commands for RedHat, CentOs or any other Linux distribution should be quite straight forward once you know what you are looking for and what you’d like to achieve.

Learn More