{"id":6089,"date":"2022-07-12T22:14:11","date_gmt":"2022-07-13T05:14:11","guid":{"rendered":"https:\/\/clikcloud.com\/?p=7568"},"modified":"2022-08-23T23:32:03","modified_gmt":"2022-08-24T06:32:03","slug":"getting-started-with-zero-trust","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/","title":{"rendered":"Getting Started with Zero Trust"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, \u201czero trust\u201d may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h1><span style=\"font-weight: 400;\">The Need for Zero Trust<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">With innovations like cloud computing come issues involved in protecting digital assets (data, applications, and more). More devices connected to the cloud (via the Internet) and also to business networks, causes the attack surface to expand. No longer can businesses assume that the security perimeter exists within company boundaries. People can connect anywhere, anytime, with the surge in remote work during the last couple of years. \u201cZero trust\u201d is a way of verifying each and every request for access, and is vital to protecting a company\u2019s digital assets. With millions of dollars and weeks of time needed to heal a breach, zero trust can save your company money, time and even reputation.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Principles of Zero Trust<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">According to the Cybersecurity Infrastructure Security Agency <\/span><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Zero_Trust_Principles_Enterprise_Mobility_For_Public_Comment_508C.pdf\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\">, zero trust is \u201caccess to an information resource (data, applications, services) for a specified period of time, with the least possible privileges.\u201d A primary principle of zero trust is verifying each and every access request. Questions asked involve the identity of the request, the health of the device the request comes from, and the role of the entity requesting access\u2013so you know who\u2019s trying to access your network.\u00a0 Even legitimate actors are asked to go an extra step, providing a one-time code, for example. This multi-factor authentication is a good first step toward zero-trust. Even after verification, users may be allowed access only to certain parts of the network (least possible privilege), in order to carry out their duties. These multiple, granular verifications have the additional benefit of gathering intelligence about requests to the network, in order to detect anomalies and possible intrusions by malicious actors.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Zero trust, even with its suspicious connotation, may be what companies need in order to protect their networks against cyber attack. For help setting up zero trust for your organization, contact your trusted technology advisor today.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, &ldquo;zero trust&rdquo; may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":6104,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100,228],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Getting Started with Zero Trust<\/title>\n<meta name=\"description\" content=\"Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, &ldquo;zero trust&rdquo; may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.&nbsp;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/\",\"name\":\"Getting Started with Zero Trust\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2022-07-13T05:14:11+00:00\",\"dateModified\":\"2022-08-24T06:32:03+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, &ldquo;zero trust&rdquo; may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.&nbsp;\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Getting Started with Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting Started with Zero Trust","description":"Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, &ldquo;zero trust&rdquo; may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.&nbsp;","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/","url":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/","name":"Getting Started with Zero Trust","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2022-07-13T05:14:11+00:00","dateModified":"2022-08-24T06:32:03+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, &ldquo;zero trust&rdquo; may be the best way to keep your company safe from cyber attacks, as it can verify each and every request for access and give workers the resources they need for their roles. Read on to learn more about how zero trust can keep your network secure while keeping you productive.&nbsp;","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/getting-started-with-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Getting Started with Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6089"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=6089"}],"version-history":[{"count":2,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6089\/revisions"}],"predecessor-version":[{"id":6141,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6089\/revisions\/6141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/6104"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=6089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=6089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=6089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}