Client PortalZero Trust
514-907-2000 info@connextek.ca
FR

Zero Trust Section

Why Zero Trust?

 

To verify a technician,

Text #verify to (438) 800-2151

Social engineering attacks targeting individuals and businesses are on the rise.

Malicious actors impersonate your IT service provider and attempt to gain access to your computer, server, or network.

By adhering to a Zero Trust policy, your staff should treat every incoming call from us with skepticism and immediately initiate the technician verification process. With a clearly defined and easily accessible procedure, you can have peace of mind in seconds, knowing that you are in contact with Connextek’s support team.

Connextek has a dedicated number for technician verification requests: (438) 800-2151.

The process couldn’t be simpler:

  1. Add Connextek as a designated contact in your phone (optional).
  2. From your mobile phone, send #verify to (438) 800-2151. Both you and the Connextek technician will receive the same randomly generated 6-digit code.
  3. The Connextek technician will verbally provide you with the 6-digit code. It must match the code you received.
  4. If the code matches, reply with #confirm to the designated number. If it doesn’t, you can hang up and call our support team directly or restart the process.
  5. You will receive an automatic message stating: “Technician verification successfully completed.”

Photo Vérification SMS

 

To verify an end user (our clients)

What is end-user verification?

End-user verification is a set of identity verification techniques that confirm the identity of the individual in question. In the context of cybersecurity and access control, identity verification refers to the process of confirming and validating the identity of individuals attempting to access a system, application, or network. The goal is to ensure that only authorized users can access specific resources while preventing unauthorized or malicious actors from doing so.

Why does Connextek use end-user verification?

Connextek has adopted a Zero Trust Policy (ZTP). ZTP is a cybersecurity approach based on the principle that no entity—whether inside or outside the organization—should be trusted by default. This security model requires strict verification of anyone attempting to access network resources, regardless of their location or the device they are using.

Why Have We Adopted a Zero Trust Policy?

There are several reasons why we have implemented a Zero Trust Policy:

What Are Typical Methods for Authenticating Identity?

The goal of identity verification is to ensure that the person claiming a particular identity is indeed who they say they are. For effective verification, it relies on multifactor authentication (MFA). Here is a list of the factors we rely on:

Verification by SMS

How does it work?

If we have a valid mobile phone number in our records, we can verify end-users via SMS. The phone number provided for all verification requests to Connextek is (438) 800-2151.

You will receive a six-digit code. Please repeat this six-digit code to your support technician within the specified timeframe.

Microsoft Authenticator

How does it work?

If Microsoft Authenticator has been set up, please open the Microsoft Authenticator app on your mobile phone and click “Approve”.

Photo Microsoft Authenticator