In the SecurityInfoWatch.com article, “Trust No One and Trust No IoT Device: A Sound Approach to Enterprise Cybersecurity. The Zero Trust Network is fast becoming a standard among CISOs,” Hikvision senior director of cybersecurity, Chuck Davis, addresses using the Zero Trust Network architecture to improve cybersecurity and address security concerns.
Applying the architecture of Zero Trust is a sound approach to cybersecurity, states Davis. Referencing insights from IBM, network compromises can come from nearly any source, and insider threats “account for 60 percent of cyberattacks.”
“How might an employee or an IoT computer—such as a video surveillance camera—be a conduit for a cybersecurity breach? Consider the enterprise environment. Is the network properly segmented? Can general employees get to servers used by HR or Accounting? Are your video surveillance cameras or other IoT devices on the same network as critical infrastructure? If you answered ‘yes’ to any of the above, you need to take a critical look at your network and digital assets,” said Davis, in the article.
The story talks about how network segmentation is a critical first step for protecting networks and systems. The Zero Trust approach, the story explains, uses micro-segmentation to determine if a user, machine or application can be trusted.
While deploying a Zero Trust Network does present challenges, Davis offered some immediate options to better secure a network. These include implementing network segmentation and teaching employees how to identify phishing attacks.
For more insights from Davis on how to improve network security and reduce concerns, read the entire article at this link.