Working from home has caused many firm’s attack surface to grow exponentially overnight. Where there might have been three locations prior to the advent of COVID19, there could now be 300 or 3,000.
Many firms are concerned with this and have shored up their security around remote access significantly. But what if the risk was still located inside their network. From careless staff to rogue employees, the consequences your business could face if tampered by an insider are unfathomable.
Research has suggested that 75% of all breaches could be avoided by better management of third party access and insider threats.
The principles of Zero Trust and least privilege is a method by which each employee is provided access to just what is needed for their job and nothing more.
The term “Zero Trust” was coined by Forrester Research analyst and thought-leader John Kindervag, and follows the motto, “never trust, always verify.” His ground-breaking point of view was based on the assumption that risk is an inherent factor both inside and outside the network.
Come hear some practical examples of how to get started utilizing zero trust in your organization to protect yourself from internal risk of employees and third parties accessing your network.