The rapid shift to remote work has forever changed the threat landscape. In the Everywhere Workplace, employees use various devices to access corporate networks, data and services as they work from different locations.
While productivity has skyrocketed, this remote work landscape has also expanded the enterprise attack surface and created a myriad of security challenges for organisations.
At the same time, threat actors have grown in sophistication and boldness. Recently, hackers have disrupted daily lives and caused widespread chaos through ransomware attacks on major meat suppliers and pipeline systems.
And according to a recent global study conducted by Ivanti, a whopping 58% of those surveyed said their organisations have suffered a ransomware attack in the past year.
Of those organisations that suffered a ransomware attack, the majority (53%) said it took between one to four weeks to recover. Ivanti surveyed over 1,000 enterprise IT professionals across the U.S., U.K., France, Germany, Australia, New Zealand and Japan.
To combat these growing threats, the Everywhere Workplace demands everywhere security. Zero trust security enables organisations to achieve a stronger and more impenetrable network by continually verifying each asset and transaction before permitting any access.
Verification includes, but is not limited to, strong authentication of users, posture checks for devices and micro-segmentation of networks. Zero trust also takes the whole context of the user’s environment into consideration, not just unconnected pieces of data, before granting access.
“Zero trust is the only security framework that can enable companies to effectively defend against the onslaught of attacks and enable a trusted and secure Everywhere Workplace,” said Dr. Chase Cunningham, Industry Analyst, formerly of Forrester and creator of Forrester’s Zero Trust eXtended Ecosystem.
“By implementing a zero trust security strategy that includes automation technologies, organisations can achieve comprehensive security across users, devices, apps, networks and data.”