This is Two Minute Tech Tips, I’m your host Lester Steward. In this series we are discussing Business cybersecurity and what you need to know to protect your business.
Trust nothing, verify everything. This is the mantra of zero trust philosophy. Early computers and networks didn’t need too much security because no one was looking to steal everything you own over the internet. The more the world became interconnected, the more ways dishonest people found to earn money fast.
Zero trust philosophy has come about because threats no longer are just outside the network. Most people would think that “if there is no one directly connected to my WIFI or Ethernet then I’m safe”, almost like a walled garden. But with all the cloud services we allow inside our networks there are bound to be security holes. This is where zero trust says, “even though you came from a known network I still need to verify you are safe.”
Zero trust philosophy has been around for a long time now but hasn’t seen much traction until the rise of ransomware attacks that comb your network from the inside and encrypt your data and backups. How the ransomware gets onto the network could be from a person clicking on a bad link on the internet and ignoring warnings from the antivirus or maybe opening an email from someone they don’t know. Education can only go so far, so we need to implement safeguards.
Zero trust takes a few steps to implement properly, which we will discuss on our next episode.
If you need any information on this subject, please let North Tech Group know by visiting our website ntgak.com. Thanks for joining me, Lester Steward for your Two Minute Tech Tips, helping you keep safe in your cybersecurity world.