20 Apr 2021

Cybersecurity, Crises, and COVID-19 - The Zero Trust Solution

Guest blog by Blackberry as part of our #Cyber2021 week.

Zero Trust, as the name implies, is a security model where everything inside or outside an organization is initially treated as a threat. Nothing is granted access to organizational resources until it builds (and maintains) trust. The Zero Trust philosophy is attributed to John Kindervag, a former principal analyst at Forrester Research Inc., who coined the term in 2010.  
 
This framework solves the problem of securing every location and device used by remote employees by assuming they are untrusted by default. 
 
Employees and new devices can connect to business infrastructure, but until they perform steps establishing their trustworthiness, their access is safely limited. Trust (and greater access) can be granted through a series of quick, non-intrusive measures commonly used today: two-factor authentication, security questions, etc. Once necessary access is granted, the user and connected device(s) are continuously monitored to ensure nothing suspicious occurs. The process sounds like it would be intrusive and resource-intensive, but AI makes achieving an almost frictionless Zero Trust security posture possible. 
 
Ensuring that third-party apps and OEM software on BYOD devices is secure is another monumental task achievable through a Zero Trust framework. Work resources are relatively easy to monitor and protect within the business environment, but what happens when they are transferred to insecure BYOD devices? Implementing a secure gateway with IP layer security optimized for mobile and low power devices can protect employee browsing and internal communications. Devices using the gateway can be sheltered from malicious URLs, dangerous apps, and phishing campaigns. 
 
Disasters, both natural and manmade, inevitably place a heavy burden upon organizations while creating opportunities for malicious actors. Businesses, however, do not have to operate at a perpetual disadvantage. Implementing a Zero Trust framework for remote workers and BYOD devices can eliminate or reduce many successful tactics threat actors deploy in times of crisis.  
 
Jill Broom

Jill Broom

Head of Cyber Resilience, techUK

Annie Collings

Annie Collings

Programme Manager, Cyber Resilience, techUK

Francesca Richiusa

Francesca Richiusa

Programme Team Assistant for Public Sector Markets, techUK

Olivia Staples

Junior Programme Manager - Cyber Resilience, techUK

Tracy Modha

Tracy Modha

Programme Marketing Assistant for Public Sector Markets, techUK