zero trust security

The form of cybersecurity is becoming more and more severe, and an effective solution is urgently needed. The “2017 Annual Cybercrime Report” released by the American cybersecurity company Cybersecurity Ventures predicts that by 2021, the total global economic loss caused by cybercrime will reach 6 trillion US dollars per year, That’s more than double the $3 trillion in 2015. Business executives realize that if existing security approaches alone are not enough to deal with the growing security landscape, they need something better, and a zero trust model just happens to deliver the best results. The “Zero Trust Model” basically breaks the old-fashioned perimeter defense thinking, which focuses on defending the perimeter, assuming that nothing that is already inside the perimeter will pose a threat, so the internal affairs of the perimeter are basically unimpeded and all have access rights. But a growing number of security experts and technologists disagree on the effectiveness of border defenses. Especially in the recent several serious data leakage incidents, after hackers broke through the external defense, they lurked in the corporate intranet and gradually gained higher authority by exploiting internal system vulnerabilities and management flaws. Few obstacles were encountered along the way. This also proves that the “internal network is secure” argument once advocated by most people is fundamentally wrong. An inherent problem with IT systems is that too many things can “cruise” via default connections. People’s trust is too high, which is why the Internet took off, because everyone can share anything, anytime, anywhere. But “trust” is also a double-edged sword, and that’s the crux of internet security: if you trust everything, you have no chance of keeping anything safe. From the previous year, the average size of data breaches rose 1.8 percent to an average of 24,000 records per incident. Business executives realize that if existing security approaches alone are not enough to deal with the growing security landscape, they need something better, and a zero trust model just happens to deliver the best results. The “Zero Trust Model” basically breaks the old-fashioned perimeter defense thinking, which focuses on defending the perimeter, assuming that nothing that is already inside the perimeter will pose a threat, so the internal affairs of the perimeter are basically unimpeded and all have access rights. But a growing number of security experts and technologists disagree on the effectiveness of border defenses. Especially in the recent several serious data leakage incidents, after hackers broke through the external defense, they lurked in the corporate intranet and gradually gained higher authority by exploiting internal system vulnerabilities and management flaws. Few obstacles were encountered along the way. This also proves that the “internal network is secure” argument once advocated by most people is fundamentally wrong. An inherent problem with IT systems is that too many things can “cruise” via default connections. People’s trust is too high, which is why the Internet took off, because everyone can share anything, anytime, anywhere. But “trust” is also a double-edged sword, and that’s the crux of internet security: if you trust everything, you have no chance of keeping anything safe.

Leave a comment

Your email address will not be published. Required fields are marked *