Cyber Security Tip: What is this new “zero trust” thing?

Cyber Security Tip: What is this new “zero trust” thing?

Aug 1, 2023

Zero trust is a relatively new cyber security strategy that is rapidly becoming the security model of choice for businesses. In fact, we anticipate this to be the new standard to meet data protection compliance for all organizations, large and small.

Essentially the only application and logins allowed are those preapproved by you, and everything else is treated with zero trust, locking down your network. Here’s an example of how it works…

Imagine you own a shopping mall and want to protect it from a shooting, shoplifters or other bad people. You place cameras and guards by every door to monitor people coming in and out. Maybe you even have a metal detector.

Problem is, the doors are wide open and you are relying on the people running security to spot a bad guy, which means there’s room for error. How do you spot a shoplifter or mugger? They don’t wear a sign that says, “I’m a shoplifter!” as they enter the mall.

A zero trust environment ONLY lets the people into the mall who you know personally. You essentially have “zero trust” for anyone who wasn’t invited in, and you block them ALL except for those specific people (applications) you know and trust.

On a computer network, that means applications like Office or QuickBooks are allowed, but NOT something that is new or unvetted.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Related Posts

Cyber Security Tip: The #1 threat to your security is…

Cyber Security Tip: The #1 threat to your security is…

IT Security Tip #22:

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what websites your employees are visiting, what files they’re sending and receiving, and even what they’re posting in company e-mail, you could be opening yourself up to a world of hurt.

Cyber Security Tip: 3 essential rules for all cloud applications

Cyber Security Tip: 3 essential rules for all cloud applications

IT Security Tip #21:

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So, it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:

0 Comments