Zero trust could be the key to defending against barrage of ransomware attacks - Technology News

Breaking News

Zero trust could be the key to defending against barrage of ransomware attacks

Zero-trust architecture will increase the efficiency of cybersecurity solutions to stop data breaches by 144%, a new report from Symmetry Systems and Osterman Research is saying.

Surveying 125 IT and security decision-makers from both midsize and large organizations, on their plans surrounding zero-trust architecture, the two companies found that the majority of organizations are well acquainted with the advantages of zero-trust and are rushing to deploy.

For the majority (53%), the main motivator for the deployment of zero-trust architecture is ransomware attacks. However, they are also keen on securing customer data, as well as protecting themselves, and their employees, in these new remote-first and hybrid working-first environments. 

"Today's threat environment is drastically different from what we have experienced even in recent years – with relentless cyberattacks, the adoption of cloud services and mass remote or hybrid work," said Michael Sampson, Senior Analyst at Osterman Research. "Many organizations have begun the transition to a zero-trust architecture and those who have not are behind the curve."

Legacy system limitations

How many will be left behind? Not too many, but still a significant portion, the report suggests. Allegedly, more than 90% of respondents confirmed their organization was planning an enterprise-wide deployment of zero-trust architecture.

Zero-trust allows for the elimination of one point of failure, during a data breach. Even if malicious actors get their hands on login credentials, database locations or IPs, with zero-trust integration that information is useless, as they’re barred from accessing information given to application roles, cloud-network perimeters, or Identity and Access Management (IAM). Speaking of IAM, almost three-quarters (73%) of respondents are focused on IAM for employees, as the key design modification for zero trust. 

Elsewhere in the report, the two companies listed different challenges businesses are facing when deploying zero-trust architecture, with the majority (55%) saying legacy system limitations were their number one barrier. 

You might also want to check out our list of the best VPN providers out there



from TechRadar - All the latest technology news https://ift.tt/3I0Xi7z

No comments