27 Jun 2025
by Stuart Kenny

Rethinking Trust in a Time of Cyber Turbulence

Read a guest insight by Origin Secured, showcasing the importance of verifying digital interactions

 When Internal Meetings Become a Security Risk

The recent measures taken by major UK retailers in response to cyber attacks, including system shutdowns, restrictions on remote access, and enforcing in-person verification, go beyond mere operational disruption. These actions expose a fundamental issue in how organisations approach trust, identity, and control.

When a business has to ask, “Are we sure who’s on this call?”, it reveals a deeper issue. The problem isn’t only external cyber threats; it’s about the systems and assumptions that allow those vulnerabilities to exist.

Insight: Reactive Security Is Not Sustainable

Reactive responses to security risks represent a mindset rooted in an era when data was centralised, identity was static, and threats were predominantly external.

Today, the landscape is different. Organisations must validate people, processes, and permissions across distributed systems, remote workers, and an expanding digital perimeter. The breakdown isn’t just in the hardware or software; it’s in the trust models that assume access equals security.

The Real Issue: Unverifiable Interactions

At the heart of these challenges is the inability to verify digital interactions confidently. Consider these scenarios:

  • Employees are discouraged from recording calls due to interception risks.
  • Remote access tools are disabled because the organisation isn’t sure who’s using them.
  • Internal messages are flagged as a risk because there’s no assurance of data control once they are shared.

The fundamental problem? Organisations lack the mechanisms to consistently verify participants, authorisations, or information flow with confidence. It’s not just a question of defending against AI-driven threats like deepfakes; it’s about addressing the absence of verifiable trust in every interaction.

Why Digital Trust Matters More Than Ever

Every business today operates, in some capacity, as a digital trust platform. It’s no longer enough to simply protect data. Organisations must prove, in real time, the integrity of every interaction. This applies whether it’s an employee logging into a system, a supplier sharing sensitive documents, or a contractor joining a virtual meeting.

For sectors managing personal, financial, or sensitive data, trust must be enforced through methods that are cryptographic, consistent, and instantaneous. Trust cannot be inferred; it needs to be something tangible, verifiable, and unfailing.

Looking forward, organisations need to implement trust models that don’t just react to threats but actively prevent them. Trust must move beyond being an assumption and become a measurable, enforceable standard for every digital interaction.

Take Action to Strengthen Your Digital Trust

The need to rethink trust models has never been more urgent. Organisations must build systems that enable verification without compromising functionality or efficiency. After all, in a world where anyone could claim to belong in a virtual room, the ability to prove or disprove that claim with confidence and transparency becomes paramount.

Don’t assume trust, demand an Origin.


To explore solutions that establish proactive and verifiable trust, visit Origin Secured.

Stuart Kenny

Stuart Kenny

CEO, Origin Secured

A seasoned entrepreneur with over 20 years of experience in global technology roles, Stuart has a proven track record of building innovative companies that are focused on client success. 


Digital Identity  programme activities

Digital identities will provide a gateway for citizens and SMEs into the digital economy. techUK members demonstrate the benefits of digital identity to emerging markets, raise their profile as thought leaders, influence policy outcomes, and strengthen their relationships with potential clients and decision-makers. Visit the programme page here.

 

Upcoming events

Latest news and insights 

Learn more and get involved

 

Get our digital identity insights straight to your inbox

Sign-up to get the latest updates and opportunities from our Digital Identity, Technology and Innovation, Cloud, and Data Analytics and AI programmes.

 

Here are the five reasons to join the Digital Identity programme

Download

Join techUK groups

techUK members can get involved in our work by joining our groups, and stay up to date with the latest meetings and opportunities in the programme.

Learn more

Become a techUK member

Our members develop strong networks, build meaningful partnerships and grow their businesses as we all work together to create a thriving environment where industry, government and stakeholders come together to realise the positive outcomes tech can deliver.

Learn more

Meet the team 

Sue Daley OBE

Sue Daley OBE

Director, Technology and Innovation

Laura Foster

Laura Foster

Associate Director - Technology and Innovation, techUK

Chris Hazell

Chris Hazell

Programme Manager - Cloud, Tech and Innovation, techUK

Usman Ikhlaq

Usman Ikhlaq

Programme Manager - Artificial Intelligence, techUK

Elis Thomas

Elis Thomas

Programme Manager, Tech and Innovation, techUK

Tess Buckley

Tess Buckley

Programme Manager - Digital Ethics and AI Safety, techUK

 

Related topics

Authors

Stuart Kenny

CEO & Co-Founder, Origin Secured