Philip de Souza
Bio
I am the founder and CEO of Aurora, a cybersecurity firm specializing in targeting specific problems with sensitive data and creating individualized solutions for various companies.
Website: https://www.aurorait.com/
Stories (3)
Filter by community
Enhancing Identity and Access Management
Multi-Factor Authentication (MFA) is one of the most frequently required cybersecurity solutions by industry standards, insurance providers, and companies. In the recent executive order by the Whitehouse on improving cybersecurity, they mandated that MFA be implemented by federal organizations. Additionally, many insurance companies are requiring MFA as a basic requirement for obtaining cyber insurance. MFA is being frequently required because of its simplicity and effectiveness in ensuring identity. MFA is an identity and access management (IAM) solution that prompts users to ensure their identity on multiple devices to allow them access to an application or set of data. This can help block someone using stolen credentials from accessing your organization’s system. It is a basic and effective way to begin ensuring that the users accessing your organization’s data is authorized to do so.
By Philip de Souza4 years ago in Lifehack
DLP Solutions to Protect the Data on Your AWS Infrastructure
Context The recent COVID-19 pandemic accelerated the adoption of remote work. Companies are increasingly moving away from earlier remote work solutions, such as establishing VPN tunnels for remote workers to connect securely to the companies on-premise systems, in favor of cloud solutions, like AWS Workspaces.
By Philip de Souza5 years ago in Journal
Implement Vulnerability Assessment Consulting Services
For every new day, new vulnerabilities can arise in your organization's environment. The increase in BYOD (bring your own device) working environments and employees working from home has changed the way that organizations operate. The control of vulnerabilities no longer operates in the same way as it was only a few years ago. When all employees were working on the same office network, the act of scanning for vulnerabilities was more simplistic than employees that work on the cloud. However, even if your employees are working in the same office network, cybersecurity threats are continuing to grow. For these reasons, implementing vulnerability assessment consulting services is critical. They are an essential step towards protecting your environment from cybersecurity attacks. When vulnerability assessment consulting services are implemented in your environment, the service provider will scan your environment and begin remediating any vulnerabilities.
By Philip de Souza5 years ago in 01


