This is Two Minute Tech Tips, I’m your host Lester Steward. In this series we are discussing Business cybersecurity and what you need to know to protect your business.
While trying to wrap up this series on Zero Trust networks, I had a thought, even with all the authentication, layers of security, logging, controlling permissions and more authentication, is it enough. How long will these protections be sufficient to keep out bad actors from the network and causing havoc? And I’ve said it before it’s a constant battle to stay ahead and most of the time we tend to be behind by a step or two. The email protection experts at Proofpoint state, “Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up by 31%. That risk is only increasing in an era of remote working and distributed teams.” So really, we as business owners and IT professionals must just do our best to stay vigilant and try to not get burnt out.
No one application or service will get you to zero trust and it takes time to implement and consistent review to maintain. The four pillars of a Zero Trust network that I discussed can be summed up as always identify users, always control permissions, always analyze traffic, and always secure the data. Some of these processes can be automated after initial setup and there are tools like a firewall that help with this but having an audit process will identify gaps and catch any potential issues before they become an emergency.
On the next episode I’ll be discussing a little bit of lighter series on the components to a PC and what to look for when purchasing one.
If you need any information on this subject, please let North Tech Group know by visiting our website ntgak.com.
Thanks for joining me, Lester Steward for your Two Minute Tech Tips, helping you keep safe in your cybersecurity world.