Zero Trust Security: Who do you trust when it comes to security?

The recent incidents of ransomware attacks have rattled the world of IT and data security. From the SolarWinds hack in December 2020 to the recent strike on JBS Meat, we have witnessed an apparent surge in the number of cyber-attacks.

The world is still recovering from the Colonial Pipeline hack that took down the largest fuel pipeline in the U.S. and led to major shortages across the East Coast. The fact that the event was the result of a single compromised password forces us to re-think our cybersecurity strategy.

Last year, the pandemic forced us to add capacity to support remote working for our businesses. Most organizations have faced an increase in the number of phishing, identity theft, ransomware, and other similar attacks over the last 12 months.

The companies have been adapting to the new normal and doing their best to cope with the ongoing changes. In 2021, organizations are optimizing their investments with a focus on employee experience, administration ease, improving visibility, and better threat response, given the new normal.

Zero trust security seems to be gaining ground. Based on a survey conducted by Enterprise Management Associates (EMA) and Pulse Secure, 60% of organizations have accelerated their zero trust projects during the pandemic, while only 15% have slowed down.

Zero trust requires context-based access, which is not easy to implement without some thorough groundwork. This is not easy to implement without a complete understanding of the information assets within the organization.

Successful zero trust implementation depends on the following factors:

Data Mapping

In order to do zero-trust security, organizations have to embrace informatio