Why you should trust nothing and verify everything

0
432

Combine this complacency with the panic of the early days of the pandemic when businesses were overwhelmed and needed to give employees all the access they could to keep their businesses running and it has created a perfect cyber security storm.

“Attackers have capitalised on this work-from-home mindset where we’ve all downshifted a gear; we’re a little bit more relaxed, a bit more complacent, a little bit more naïve,” says Bugal.

“If something comes in over email, because that’s the way we’re all contacted today, asking us to jump on a support portal and click a link, then we’ve just given access to an attacker – a small little foothold.

“That’s all they need to start elevating their privilege and spreading their wings. By the time they’ve got to that point, they’ll say let’s let them know we’re here by dropping some ransomware.

“This is when things have gone horribly sideways and it’s been all too prevalent during the pandemic.”

Zero trust architecture – which has moved into the mainstream since its inception in 2010 – is based on a ‘never trust, always verify’ ethos, which means attackers are met by a series of locked doors throughout…

Read More…

Актуальные книги на английском