{"id":6114,"date":"2022-05-16T16:04:33","date_gmt":"2022-05-16T23:04:33","guid":{"rendered":"https:\/\/clikcloud.com\/?p=7520"},"modified":"2022-08-24T00:57:57","modified_gmt":"2022-08-24T07:57:57","slug":"considering-zero-trust-as-part-of-your-cybersecurity-plan","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/","title":{"rendered":"Considering Zero-Trust as Part of Your Cybersecurity Plan"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter \u201czero trust\u201d, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Why Zero Trust is Important Now<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In recent decades\u2013especially the last two years since work went remote\u2013more users are connected to business networks and other Cloud services. With the \u201cperimeter\u201d now outside the traditional office, more care is necessary to grant access only to legitimate users. With more devices connected, data and applications are available to more people. In the zero-trust model, no individual is assumed to be trustworthy simply by being part of the organization. And that begs the question of who is a legitimate user.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Zero Trust Defined<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Zero-trust is a cybersecurity posture that assumes that any user seeking to access the system could be a bad actor. Organizations using a zero-trust <\/span><a href=\"https:\/\/www.nist.gov\/publications\/zero-trust-architecture\"><span style=\"font-weight: 400;\">architecture<\/span><\/a><span style=\"font-weight: 400;\"> have set up various criteria to determine that the entity (a device or a person) seeking access is entitled to it. Not only that, but depending on the location of the device and the role of the person using it, access can be limited to the computing resources needed for that person\u2019s function. A common practice used in zero-trust is multi-factor authentication. After giving their password, a user performs an additional step, like submitting a one-time code.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The Why of Zero Trust<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The \u201cwhy\u201d of zero trust comes from so many more devices connected to business networks and the Internet, as well as the growth of cloud solutions. Cyberattacks have become ever more frequent, and businesses need a way to verify the validity of access requests. Besides this, once the business has the criteria set up to determine legitimate activity, it is better able to spot suspicious activity. With other cybersecurity practices and tools, zero trust is yet another way to secure your company\u2019s network.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Naturally, companies want their systems, data and applications to be as secure as possible. For help with setting up a zero-trust environment, contact your trusted technology advisor today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter &ldquo;zero trust&rdquo;, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.<\/p>\n","protected":false},"author":1,"featured_media":6119,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Considering Zero-Trust as Part of Your Cybersecurity Plan<\/title>\n<meta name=\"description\" content=\"At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter &ldquo;zero trust&rdquo;, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/\",\"name\":\"Considering Zero-Trust as Part of Your Cybersecurity Plan\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2022-05-16T23:04:33+00:00\",\"dateModified\":\"2022-08-24T07:57:57+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter &ldquo;zero trust&rdquo;, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Considering Zero-Trust as Part of Your Cybersecurity Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Considering Zero-Trust as Part of Your Cybersecurity Plan","description":"At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter &ldquo;zero trust&rdquo;, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/","url":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/","name":"Considering Zero-Trust as Part of Your Cybersecurity Plan","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2022-05-16T23:04:33+00:00","dateModified":"2022-08-24T07:57:57+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"At one time, a firewall and antivirus protection were adequate protections to keep networks secure. Businesses had a perimeter, a boundary protecting the network from unauthorized access. All that has changed over the years, with millions of devices connected to networks all over the world, and to the Internet via these networks. Enter &ldquo;zero trust&rdquo;, granting access on a case-by-case basis. Read on to learn more about this principle and how it can benefit your organization.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/considering-zero-trust-as-part-of-your-cybersecurity-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Considering Zero-Trust as Part of Your Cybersecurity Plan"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6114"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=6114"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6114\/revisions"}],"predecessor-version":[{"id":6118,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/6114\/revisions\/6118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/6119"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=6114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=6114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=6114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}