<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Guillaume GADEYNE, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/guillaume-gadeyne/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/guillaume-gadeyne/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 09 Oct 2024 18:41:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Guillaume GADEYNE, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/guillaume-gadeyne/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Authenticating blue-collar workers: a challenge too often neglected?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/#respond</comments>
		
		<dc:creator><![CDATA[Guillaume GADEYNE]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 07:21:27 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[blue-collars]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[Industry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24138</guid>

					<description><![CDATA[<p>Since the Covid crisis, we&#8217;ve seen an increase in the frequency of cyberattacks on the industrial sector. Between 2019 and 2020, the number of such attacks has quadrupled, taking the form of ransomware in 80% of the cases[1], and potentially...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since the Covid crisis, we&#8217;ve seen an increase in the frequency of <strong>cyberattacks on the industrial sector</strong>. Between 2019 and 2020, the number of such attacks has <strong>quadrupled</strong>, taking the form of ransomware in 80% of the cases<sup>[<a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing">1</a>]</sup>, and potentially leading to significant economic consequences.</p>
<p style="text-align: justify;">This trend can be explained by a desire to digitalize factories and develop connected industry that has rarely been accompanied by the modernization of the associated industrial systems: attacks are made simpler, their consequences stronger. And in the case of ransomware, a <strong>lack of authentication</strong> is often the starting point of the <strong>kill-chain</strong>: too weak or based on <strong>shared authentication factors between operators</strong>, accounts become <strong>susceptible to phishing attacks</strong>.</p>
<p style="text-align: justify;">This observation can also be found by analyzing the “Industrial Cyber IS incident files”<sup>[<a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">2</a>]</sup> shared by <strong>Clusif</strong>. These include the takeover of the production system of a German steel mill, which could have been avoided <strong>if a second authentication factor had been required</strong> when carrying out critical actions on the industrial site.</p>
<p style="text-align: justify;"><strong>The need to secure and modernize authentication methods for <em>blue-collar</em> workers </strong>is therefore crucial, in order to <strong>limit the risk</strong> of theft of these often poorly protected accounts, <strong>without adversely affecting the overall productivity </strong>of on-site operators.</p>
<p style="text-align: justify;">The aim of this article is therefore, after going into more detail on the current context and the constraints linked to these populations, to <strong>compare the different solutions available</strong> today for these uses, to <strong>analyze the obstacles to the democratization</strong> of the methods deemed the most promising, and to <strong>share our vision and recommendations</strong> for catching up as best we can.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What is authentication?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Authentication means certifying your identity to a computer system before you can access secure resources. Throughout this article, we&#8217;ll be talking about multi-factor authentication when at least two of the four authentication factors below are combined:</p>
<ul style="text-align: justify;">
<li>What I know (password, PIN, scheme, etc.)</li>
<li>What I have (personal device, USB key, smart card, badge, etc.)</li>
<li>What I am (facial recognition, fingerprint, vein network, etc.)</li>
<li>What I do (eye movement, signature, typing dynamics, etc.)</li>
</ul>
<p style="text-align: justify;">Note: the level of security depends on the robustness of the factors and their independence when combined<sup>[<a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe">3</a>]</sup>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Blue-collar workers: a diverse range of uses&#8230;</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">When we talk about the blue-collar population, we mean <strong>all manual workers who don&#8217;t have their own professional workstation</strong> (e.g. mechanical, industrial and personal care professions). These populations have different authentication requirements to the so-called white-collar populations, as they mostly use an office information system with <strong>multiple devices shared</strong> between different employees:</p>
<ul style="text-align: justify;">
<li>Mobile workstations and tablets (access to production management software (MES), etc.)</li>
<li>Fixed control workstations (machine tool control, management, etc.)</li>
<li>Shared office workstations (time and attendance, training, etc.)</li>
</ul>
<p style="text-align: justify;">Operators must therefore be able to <strong>authenticate themselves on control stations</strong>, for example directly connected to the machine tools using a network card, but also independently of their location within the site <strong>on mobile stations</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">… with multiple constraints</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In order to make the best possible assessment of the various <strong>authentication solutions available to blue-collar workers</strong>, it is important to bear in mind their specific <strong>professional constraints</strong>.</p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-24140" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png" alt="Pace contraints, personal protective equipment and constraints linked to regular shift changes" width="357" height="355" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image1-ENG-39x39.png 39w" sizes="(max-width: 357px) 100vw, 357px" /></p>
<p style="text-align: justify;">These can be broken down into <strong>three main areas</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>Pace constraints</strong>: working under automatic cadence and complying with production standards <strong>precludes the use of long or untimely processes</strong>.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to the wearing of PPE</strong><span style="font-size: revert; color: initial;"> (personal protective equipment) such as gloves or masks: these can prevent the use of certain </span><strong style="font-size: revert; color: initial;">biometric factors</strong><span style="font-size: revert; color: initial;"> (facial recognition, fingerprint, etc.) or make the use of passwords </span><strong style="font-size: revert; color: initial;">less ergonomic</strong><span style="font-size: revert; color: initial;"> (use of gloves on touch screens or keyboards).</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Constraints linked to regular changes of workstation</strong><span style="font-size: revert; color: initial;">: regularly changing workstation means having to </span><strong style="font-size: revert; color: initial;">authenticate several times a day </strong><span style="font-size: revert; color: initial;">on</span><strong style="font-size: revert; color: initial;"> different workstations</strong><span style="font-size: revert; color: initial;">. What&#8217;s more, if this authentication is local, prior </span><strong style="font-size: revert; color: initial;">enrolment</strong><span style="font-size: revert; color: initial;"> will have to be carried out </span><strong style="font-size: revert; color: initial;">for each of them</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">Beyond blue-collar constraints, there are other factors to consider from an <strong>employer&#8217;s point of view</strong>.</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-24142" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png" alt="the issue of uniformity, the substantial investment and the physical security already in place" width="360" height="359" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-192x191.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image2-ENG-300x300.png 300w" sizes="(max-width: 360px) 100vw, 360px" /></p>
<p style="text-align: justify;">There are also <strong>three main themes</strong>:</p>
<ul>
<li style="text-align: justify;"><strong>An important issue of uniformity</strong>: all employees should be able <strong>to authenticate in the same way</strong> on all machines and software, in order to have a common user experience, a single process, support and documentation.</li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Significant investment</strong><span style="font-size: revert; color: initial;">: an authentication solution is </span><strong style="font-size: revert; color: initial;">costly to acquire</strong><span style="font-size: revert; color: initial;"> (e.g. badges, wristbands, sensors) but also to </span><strong style="font-size: revert; color: initial;">maintain</strong><span style="font-size: revert; color: initial;"> (e.g. support &amp; servers). These costs may be difficult to justify if employees </span><strong style="font-size: revert; color: initial;">don&#8217;t need to access sensitive resources</strong><span style="font-size: revert; color: initial;">.</span></li>
<li style="text-align: justify;"><strong style="font-size: revert; color: initial;">Physical security already in place</strong><span style="font-size: revert; color: initial;">: adding a second factor or hardening the first may </span><strong style="font-size: revert; color: initial;">seem pointless</strong><span style="font-size: revert; color: initial;"> to companies that </span><strong style="font-size: revert; color: initial;">already physically secure</strong><span style="font-size: revert; color: initial;"> their sites, and therefore assume that an individual with physical access to the device will be </span><strong style="font-size: revert; color: initial;">trustworthy</strong><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are available on the market?</h2>
<p style="text-align: justify;"> </p>
<figure id="attachment_24144" aria-describedby="caption-attachment-24144" style="width: 602px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-24144 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png" alt="password is used for aeronautics, energy, jewellery, automotive and perfumery. Badges used for defense, aeronautics and railways. PIN code used for defense and railways. MFA used for defense, aeronautics and railways" width="602" height="204" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image3-ENG-600x204.png 600w" sizes="(max-width: 602px) 100vw, 602px" /><figcaption id="caption-attachment-24144" class="wp-caption-text"><em>Figure 1: Authentication methods used in the defense, aeronautics, rail, energy, jewelry, automotive and perfume industries.</em></figcaption></figure>
<p style="text-align: justify;"><strong>Two main categories</strong> stand out:</p>
<p style="text-align: justify;">&#8211; <strong>“Mature” players</strong>, offering <strong>multi-factor</strong> authentication with a badge coupled with a <strong>password</strong> or a locally stored <strong>PIN code</strong>. This choice enables physical and logical access to be merged, for example, by authorizing access to devices controlling production lines via access badges integrating the <strong>FIDO2 standard</strong>.</p>
<p style="text-align: justify;">&#8211; <strong>Less mature players</strong>, who maintain weak authentication using <strong>passwords</strong> only. They remain in the majority, and the accounts they use are often generic, to maximize <strong>authentication speed</strong> and thus <strong>productivity</strong>.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What authentication methods are needed to meet these challenges?</h2>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Several criteria to consider&#8230;</h3>
<p style="text-align: justify;">In order to compare the various possible methods, <strong>six criteria</strong> were considered, with particular emphasis on two main issues: <strong>user experience</strong> and <strong>security</strong>.</p>
<figure id="attachment_24188" aria-describedby="caption-attachment-24188" style="width: 1289px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24188 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png" alt="User experience, Maturity, ease of deployment, security, cost and regulatory constraints" width="1289" height="487" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG.png 1289w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image4-V2ENG-768x290.png 768w" sizes="auto, (max-width: 1289px) 100vw, 1289px" /><figcaption id="caption-attachment-24188" class="wp-caption-text"><em>Figure 2 : Description of the criteria used to assess authentication methods</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">&#8230; to identify the most relevant authentication methods</h3>
<p style="text-align: justify;">Based on these criteria, the authentication methods considered relevant and viable for blue-collar workers can be distributed as follows:</p>
<figure id="attachment_24190" aria-describedby="caption-attachment-24190" style="width: 1164px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24190 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png" alt="Evaluation of authentication methods based on ergonomics, security level, difficulty of integration and cost" width="1164" height="655" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG.png 1164w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image5-V2-ENG-800x450.png 800w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /><figcaption id="caption-attachment-24190" class="wp-caption-text"><em>Figure 3 : Summary of authentication methods by level of security and ergonomics</em></figcaption></figure>
<p style="text-align: justify;">In addition to biometric solutions, which are heavily regulated in France by the CNIL, <strong>RFID/NFC cards</strong> (badges) are emerging as offering <strong>the best ergonomics for a satisfactory level of security</strong>. This is in line with what has been observed among “mature” players in this field.</p>
<figure id="attachment_24192" aria-describedby="caption-attachment-24192" style="width: 1274px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-24192 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png" alt="Zoom on RFID/NFC cards for blue-collar authentication (description, use cases, pros and cons)" width="1274" height="567" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG.png 1274w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-429x191.png 429w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image6-V2-ENG-768x342.png 768w" sizes="auto, (max-width: 1274px) 100vw, 1274px" /><figcaption id="caption-attachment-24192" class="wp-caption-text"><em>Figure 4 : RFID/NFC card sheet</em></figcaption></figure>
<p style="text-align: justify;"><strong>Coupled with a PIN code or password</strong>, it enables multi-factor authentication and, for most industrial players, represents an easy-to-use solution for increasing operator access security.</p>
<p style="text-align: justify;">However, it may not be sufficient in <strong>particularly</strong> <strong>sensitive industries</strong>, where some innovative solutions may stand out:</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>FIDO2 biometric key</strong>: </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24152" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png" alt="" width="124" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7.png 124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image7-71x29.png 71w" sizes="auto, (max-width: 124px) 100vw, 124px" /></p>
<ul>
<li>Many machines have a USB port, and the <strong>FIDO2 standard</strong> ensures compatibility with a wide range of applications.</li>
<li>The fingerprint replaces the PIN code, ensuring security even if the key is lost or stolen.</li>
<li>No biometric images are saved, and no templates are stored anywhere other than in the key.</li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The <strong>biometric wristband</strong> is also based on the <strong>FIDO2 protocol</strong> (example of the “Nymi” wristband, not affiliated with Wavestone):</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24154" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png" alt="" width="53" height="81" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Image8-26x39.png 26w" sizes="auto, (max-width: 53px) 100vw, 53px" /></p>
<ul>
<li>Each employee receives a wristband and enrolls using his or her fingerprint.</li>
<li>At the start of the day, each employee puts on their wristband and unlocks it with their fingerprint.</li>
<li>As long as employees do not remove their wristbands, they simply pass them by equipment equipped with NFC sensors to authenticate themselves with the FIDO2 standard.</li>
<li>The wristband is able to detect “life” and locks as soon as it is removed.</li>
<li>No biometric image is saved, and no template is stored anywhere other than in the employee&#8217;s wristband.</li>
</ul>
<p style="text-align: justify;">These solutions are costly, but offer state-of-the-art security and ergonomics.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Democratization held back by several factors</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Although solutions are available, blue-collar authentication is still lagging behind, due to a number of factors:</p>
<ul style="text-align: justify;">
<li><strong>Logical access sensitivity</strong>: this is not always sufficient to justify the cost of modernizing and strengthening authentication.</li>
<li><strong style="font-size: revert; color: initial;">Attackers&#8217; priorities</strong><span style="font-size: revert; color: initial;">: management and office information systems are still the main targets of attackers, prompting companies to concentrate their security efforts on these areas.</span></li>
<li><strong style="font-size: revert; color: initial;">Software and infrastructure obsolescence</strong><span style="font-size: revert; color: initial;">: the machines and programs used on production lines may be obsolete. Companies are therefore reluctant to replace these functional resources, at the risk of running into compatibility problems.</span></li>
<li><strong style="font-size: revert; color: initial;">Imposed regulations</strong><span style="font-size: revert; color: initial;">: the CNIL does not encourage the development of biometric authentication systems in France<sup>[<a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail">4</a>]</sup></span><span style="font-size: revert; color: initial;">.</span></li>
</ul>
<p style="text-align: justify;">However, <strong>modernization is set to accelerate</strong> thanks to <strong>new security requirements</strong> linked to the <strong>development of the</strong> <strong>IoT</strong>. The <strong>FIDO2 standard</strong> is also becoming increasingly <strong>popular</strong>, and innovative solutions are beginning to gain market momentum. Finally, it&#8217;s worth noting that some online operators use the same resources as the office population, so <em>passwordless</em> solutions such as <em>Windows Hello for Business</em> are both feasible and easy to implement, thanks to the sensors integrated into devices.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Is the convergence of logical and physical access the solution to trigger large-scale democratization?</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Physical access for blue-collar workers is often already secure, since they work on sensitive sites. In most cases, a <strong>badge system</strong> is already in place for access to buildings and restricted areas, with biometric readers or other surveillance tools (video surveillance, etc.) installed on the most critical sites. This raises the question of capitalizing on and <strong>centralizing access control</strong>, and offering the same means of authentication for logical access as those already in place for physical access would offer clear advantages, while also raising new challenges:</p>
<ul style="text-align: justify;">
<li><strong>Improved user experience</strong>, with the same process for all accesses.</li>
<li>Simplified and reinforced authorization <strong style="font-size: revert; color: initial;">management</strong><span style="font-size: revert; color: initial;">.</span></li>
<li>Physical security <strong style="font-size: revert; color: initial;">teams</strong> <strong style="font-size: revert; color: initial;">need to be coordinated</strong><span style="font-size: revert; color: initial;"> with the IT department, and strong governance issues need to be anticipated.</span></li>
<li>A <strong style="font-size: revert; color: initial;">common infrastructure</strong><span style="font-size: revert; color: initial;"> is required, with all networks controlling the accesses to be connected.</span></li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://blog.hypr.com/best-practices-for-authentication-security-in-manufacturing"><em>Authentication Security Best Practices in the Manufacturing Industry</em></a>, published by Chris Collier on the blog HYPR</p>
<p style="text-align: justify;">[2] <em><a href="https://clusif.fr/publications/fiches-incidents-cyber-si-industriels/">Industrial Cyber IS incident files</a>,</em> published by the Clusif</p>
<p style="text-align: justify;">[3] <a href="https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe"><em>Recommendations for multi-factor authentication and passwords</em></a>, published by the ANSSI</p>
<p style="text-align: justify;">[4] <a href="https://www.cnil.fr/fr/le-controle-dacces-biometrique-sur-les-lieux-de-travail"><em>Biometric access control in the workplace</em></a> , published by the CNIL</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/">Authenticating blue-collar workers: a challenge too often neglected?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/authenticating-blue-collar-workers-a-challenge-too-often-neglected/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
