Page 133 - Cyber Defense eMagazine December 2022 Edition
P. 133
Typical Cybersecurity Methods Aren’t Enough to Support
the Modern Workforce
By Gee Rittenhouse, CEO, Skyhigh Security
It’s time to adopt a zero-trust approach. Organizations in all sectors are adopting the hybrid workforce
model, and this is forcing a shift in cybersecurity practices. Employees, contractors and other third parties
demand rapid and secure access to the web, cloud and private applications to support global
collaboration transparently and without disruption.
It’s no longer network security as usual. Traditional or perimeter network security mainly concerns itself
with keeping attackers out of the network with technologies like firewalls, VPNs, access controls, intrusion
detection systems (IDS), intrusion prevention systems (IPS), security information and event management
(SIEM) and email gateways. Now that remote work and the widespread use of cloud apps and services
are the common workforce model, perimeter security is rendered nearly obsolete.
One of the most important steps you can take to secure your entire hybrid estate is to implement a zero-
trust architecture, which is based on the tenet of “never trust, always verify.” Zero trust challenges the
users and devices to prove they are authorized to access resources, even if they are within the walls of
the network perimeter. In other words, zero trust treats all traffic as potentially hostile until the identity of
the device or user is authenticated according to a strict set of criteria.
Cyber Defense eMagazine – December 2022 Edition 133
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.