Page 133 - Cyber Defense eMagazine December 2022 Edition
P. 133

Typical Cybersecurity Methods Aren’t Enough to Support

            the Modern Workforce


            By Gee Rittenhouse, CEO, Skyhigh Security


            It’s time to adopt a zero-trust approach. Organizations in all sectors are adopting the hybrid workforce
            model, and this is forcing a shift in cybersecurity practices. Employees, contractors and other third parties
            demand  rapid  and  secure  access  to  the  web,  cloud  and  private  applications  to  support  global
            collaboration transparently and without disruption.


             It’s no longer network security as usual. Traditional or perimeter network security mainly concerns itself
            with keeping attackers out of the network with technologies like firewalls, VPNs, access controls, intrusion
            detection systems (IDS), intrusion prevention systems (IPS), security information and event management
            (SIEM) and email gateways. Now that remote work and the widespread use of cloud apps and services
            are the common workforce model, perimeter security is rendered nearly obsolete.

            One of the most important steps you can take to secure your entire hybrid estate is to implement a zero-
            trust architecture, which is based on the tenet of “never trust, always verify.” Zero trust challenges the
            users and devices to prove they are authorized to access resources, even if they are within the walls of
            the network perimeter. In other words, zero trust treats all traffic as potentially hostile until the identity of
            the device or user is authenticated according to a strict set of criteria.







            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         133
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   128   129   130   131   132   133   134   135   136   137   138