COVID-19 has changed how businesses think about cybersecurity forever. The opportunities for data theft have increased because of unsecured home wifi networks and the rise in personal devices accessing company resources. According to Enterprise Management Associates’ research, the pandemic has prompted 60% of enterprises to accelerate their zero-trust networking strategies. In this article at TechBeacon, Rob Lemos explains why zero-trust is critical and ways to implement the model.
Zero Trust for Remote Work
In a remote work scenario, end-users could connect to the corporate network from anywhere—from home, coffee shop, hotel, or co-working space. However, IT teams will not be able to control how or where the connection occurs. Therefore, they must rely on directory credentials, multi-factor authentication, VPNs, and cloud services to meet security protocols.
Studies have reported that 76% of these organizations have witnessed a steep rise in the number of personally owned devices connect to their networks during the pandemic. Organizations that are more successful with their zero trust strategies have stated that the initiative has given them the flexibility to better support remote workers’ networks.
How to Implement Zero-Trust
Identify the Protect Surface
“The root cause of many breaches is the use of stolen credentials; it is the second-most common threat action, according to Verizon’s 2020 Data Breach Investigation Report,” says Lemos. While implementing the zero-trust framework, you must zoom in on your organization’s most sensitive information to define your ‘protect surface.’ Your protected surface segments must contain sensitive data and essential IT operations that enhance user privileges.
Map Traffic Flows
Identifying how your sensitive data moves on your network and what devices are accessing it is crucial in protecting the organizational information. Mapping the traffic flows will allow you to gain actionable insights into your most essential devices, network, and segments. IT teams can then refine controls, permit valid traffic flows, and place boundaries between zones and segments.
To read the original article, click on https://techbeacon.com/security/zero-trust-remote-workforces-identity-access-management-key.
The post Is Zero Trust Critical for Your Companies’ Security? appeared first on AITS CAI’s Accelerating IT Success.