With cyberattacks on the rise, is it time your business went zero-trust? Find out what a zero-trust architecture is and how it keeps critical data safe

Did you know that analysts estimate that by the end of next year, cyberattacks will have cost businesses over $6,000,000,000,000?

In 2020, a ransomware attack happens every 14 seconds. Half of the cyberattacks target small businesses and non-profits. What chance do they have when even huge companies with large security budgets like Target, Marriott, Under Armour, Equifax and more have fallen prey.

This has led many security experts to conclude that only a zero-trust architecture can prevent the seemingly inevitable.

Marius Nel, a cybersecurity specialist in Atlanta shares how you can establish your own zero-trust infrastructure.

What Is a Zero Trust Architecture?

The premise behind zero trust is that you never take anything for granted. You establish a policy of “Always verify first, then trust.” It involves zero trust tools like:

  • Network monitoring software
  • Vertical and horizontal data segmentation
  • User-access control
  • Layer 7 prevention

A zero trust architecture addresses three very modern problems in most businesses:

  • Too many people have access to too much data
  • Those who have access may log-in through many devices
  • You can’t see everything that’s going on in real-time. Applications, servers, databases and users are continually sharing information back and forth. It’s hard to home in a threat quickly because of so much traffic.

Who Developed the Zero Trust Security Philosophy?

We can’t take credit for it. Zero Trust was developed by John Kindervag, former vice president and principal analyst at Forrester Research. Big and trusted technology companies like Cisco have implemented Kindervag’s zero-trust strategy.

While Kindervag developed the strategy, it’s important to note that it’s not a one-size-fits-all security solution. Any business that wants to build a zero-trust framework should consider their unique business needs, security risks and capabilities to develop the best zero trust security strategy for them.

With that said, next, let’s take a look at some of the critical elements of zero trust technology.

Deploying a Zero Trust Security Strategy

Zero trust may seem cumbersome and expensive. But it doesn’t have to be if you take a systematic approach.

1. Identify your Protect Surface

Kindervag defines this as “what we need to protect” above all else. The smaller and more consolidated we can make these protect surfaces, the better.

A zero-trust system is willing to sacrifice the unimportant to focus efforts on protecting the vitally important.

This includes:

  • Data that could be stolen or held for ransom
  • Applications that have access to sensitive information
  • Assets that could be damaged in an attack
  • Services that an attack could disrupt

2. Map Transaction Flows

Visualize where data is moving from place to place. Data may move horizontally and vertically.

You’ve specific user interfaces where people can access that data.

3. Build a Zero Trust Architecture

This includes such zero trust strategies as:

  • Two-step verification
  • Partitioning of employee access
  • Limiting your protect surface as much as possible, so you have less surface area that needs the highest level of protection
  • Verify new devices on the network and limit devices through policy where you can without hurting workflow
  • Put all third-party apps through a rigorous review process by experienced cybersecurity professionals
  • Have the ability to stop the suspicious activity immediately, so its legitimacy can be verified

4. Create a Zero Trust Policy

Create a written policy. Educate both IT and the average employee about what zero trust is, why it’s in place and what they can do as users to help reinforce the zero trust architecture.

Make employees aware of common strategies hackers use to turn employees into pawns in a hack attempt.

Consistently enforce your policy.

5. Monitor and Improve

Use technology to gain visibility into the shadowy areas in the network. Monitor traffic. Deploy machine learning tools to help identify abnormal traffic or individual user volume or behavior.

Create reports and set up alerts so that cybersecurity personnel can both address concerns quickly and look for new areas of higher risk where patches in the system could improve security.

You May Also Like
IPO to watch in
Read More

3 IPOs to Watch in 2016

Whether you are curious about stock or any other form of financial trading or simply enjoy seeing a success of the startups – IPOs are a great to watch. Not only you get to learn how undervalued or overpriced a certain company was, but you also get to see a rapid development a company can achieve with the funds it raised.

We are entering the middle of 2016 and so far there has not been too many interesting IPOs. When looking at the financial industry, it is possible to highlight the listing of the largest Dutch bank – ABN Amro. Next to this, a few ECN currency brokers flipped an IPO this year.

X-Trade Brokers, just got listed roughly a month ago, which signified the largest initial public offering in Poland during the last 365 days. Also, a leading UK brokerage, CMC Markets, started listing its stocks in February this year. Nevertheless, this IPOs weren’t too exciting. There is much more to expect in the coming month from the tech sector.

The most promising

Airbnb, a company that lets everyone lend their house, flat or a room is expected to start issuing stocks this year and this is certainly the most interesting IPO to keep your eyes on. The reason for this is very simple – apart from nearly $25Bn valuation, Airbnb actually generates some significant revenues.

What also tells us that this IPO will be a successful one is the lack of legal issues behind the business processes. Even though some laws in Germany were prohibiting the usage of such peer-to-peer services, the whole legal framework behind Airbnb is rather favourable. In addition to this, there is quite a strong support for the shared economy nowadays and, hence, this company might be seen as the safe-haven investment.

The most interesting

Do you remember last time you used a landline for calling? Well, thanks to this company, quite soon you might not remember last time you ordered a taxi. Yes, you got it right, we are talking about Uber. Even though there is no certainty whether Uber will flip an IPO this year, it is quite probable.

What makes this IPO the most interesting one? The whole legal situation behind Uber. Clients love it for its pricing and simplicity. Taxi companies hate it. Without a doubt Uber is a successful company, yet its operations strongly depend on the legal decisions of the local authorities.

While strikes against Uber happen frequently, those are the local regulators that will have a final word in determining Uber’s success in terms of market coverage and, hence, revenues.

The most amusing

Without a doubt previous two companies are here to stay. Both of them offer quite an advanced technology that simplifies people’s lives and provide cost benefits. However, there is another company that looks for an IPO this year, and many investors are laughing about it.

We are talking about Snapchat, the company that allows millennials communicating with each other, sticking funny noses on their selfies, the company that struggles to produce hardly any revenues.

While some investors laugh about this IPO, others see it as a great opportunity. Snapchat may not look like a goldmine, but it certainly has some potential. The main question is whether investors will be patient enough to see Snapchat implementing powerful advertising solutions while sustaining the growth of its user base.

Let's block ads! (Why?)