Page 120 - Cyber Defense eMagazine for July 2020
P. 120

have placed most workloads beyond the shelter of corporate networks and traditional perimeter defense.
            This creates significant user access and data concerns.

            The 2020 Zero Trust Progress Report by Pulse Secure revealed that nearly a third of cybersecurity
            professionals have expressed value in applying Zero Trust to address hybrid IT security issues. This
            report, which surveyed more than 400 cyber security decision makers, found that 72% of organizations
            plan to assess or implement Zero Trust capabilities in some capacity in 2020 to mitigate growing cyber
            risk, while nearly half (47%) of cyber security professionals lack confidence applying a Zero Trust model
            to their Secure Access architecture.

            With its principle of user, device and infrastructure verification before granting conditional access based
            on  least  privilege,  Zero  Trust  holds  the  promise  of  vastly  enhanced  usability,  data  protection  and
            governance and must be part of any security architecture as we navigate the current COVID-19 business
            landscape.”



            Telemedicine and Remote Field Offices are Changing the Needs of Healthcare Professionals

            “Healthcare is going the way of other industries with employees being asked to work remotely and post
            COVID-19,  we  believe  the  use  of  telemedicine  and  remote  field  offices  will  be  the  new  normal  in
            healthcare.

            As such, IT teams must provide healthcare workers with mobile devices that are protected, even on
            expanded Wi-Fi networks or cellular networks as employees are often working outside secure networks,
            opening their mobile devices to additional threats.

            Increasing remote capacity on network protections such as VPNs, extends security to those workers in
            the field, ensuring that both patient information as well as other personal information stored on those
            devices is safe. By deploying Zero Trust policies, info security teams can also implement fine-tuned user
            access management to ensure that network capacity is maximized and that workers only have access to
            the information that’s absolutely necessary.”




            About the Author

            Mike Riemer is the Global Chief Security Architect for Pulse Secure, where
            he has worked for the last six years. He has over 37 years of IT and IT
            Security experience and is a Certified Instructor on Firewall/Virtual Private

            Networking, Intrusion Detection/Prevention, SSL/VPN and Network Access
            Control disciplines. He previously spent 25 years with the U.S. Air Force
            working in Cyber Security and Intelligence.










            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         120
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   115   116   117   118   119   120   121   122   123   124   125