Friday, 27 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Zero Trust: Countering Cyber Threats Stemming from Human Error | DCN
Security

Zero Trust: Countering Cyber Threats Stemming from Human Error | DCN

Last updated: February 5, 2024 3:31 am
Published February 5, 2024
Share
Zero Trust: Countering Cyber Threats Stemming from Human Error
SHARE

The mainstay of cybersecurity practices has been that bad actors are ‘out there’ and defense mechanisms secure workloads and data ‘in here.’ This drives the perimeter-centric idea of enterprise security, focusing primarily on inbound attacks with firewalls and passwords to protect workloads and data.

However, after the pandemic and the consequent acceleration in digital transformation, the challenges for protecting users and workloads have increased significantly. Boardroom meetings went virtual, sensitive company data was shared among geographically distributed teams, and employees now access enterprise servers via multiple devices to stay connected.

Related: Rethinking Physical Data Center Security in the Digital Age

As the corporate IT infrastructure changed, the bad actors also evolved by changing methods and volume of attacks. The perimeter-centric view of security no longer holds in a digital, distributed IT environment with multiple failure points, which makes it easier for bad actors to scout and exploit vulnerabilities.

Often, these vulnerabilities are people. Per Verizon’s 2023 Data Breach Investigations Report, 74% of security breaches can be traced back to human error, which refers to an employee either purposefully doing something they should not or falling prey to bad actors attaining access or information from them. Over the years, the cost of a single breach has only escalated, standing at $4.3 million in 2023, according to IBM’s latest Cost of Data Breach Report.

Paranoia is good: Why Zero Trust is the Need of the Hour

Related: Preventing Sabotage and Improving Physical Data Center Security

The threat exposure landscape has evolved into a complex mesh, creating a need for something more than a perimeter-centric security approach.

See also  Four Strategies to Meet Changing Data Center Demands | DCN

Zero trust is an approach that leads to a simpler network infrastructure, a better user experience, and an improved cybersecurity posture. It enforces access policies based on context, including a user’s role and location, their device, and the data they are requesting. It blocks inappropriate access and lateral movement throughout an environment. 

And just as with any other foundational shift, the zero-trust security approach comes with its challenges.

Laying the Groundwork for Zero Trust

Enterprises find it difficult to pivot to a zero-trust security model because, at its very core, it calls for a mental shift away from the three crucial pillars of traditional security approaches:

  1. Trust perimeter: Traditional security practices assume personas that can be trusted with access. It works with the perimeter-centric view that establishes a network-based connection and grants access to systems on that network. Zero trust turns this on its head and assumes a trust perimeter is insufficient, and instead requires every stakeholder to establish identity and the need for access on a workload-by-workload basis.
  2. Networks provide security: Traditional enterprise security revolves around firewalls, virtual private networks (VPNs), or dedicated physical network connections. These have proved to be inadequate, expensive, and difficult to manage. The zero-trust security model eliminates the need for many of these network technologies, freeing up costs and providing greater flexibility.
  3. IAM-first focus on people: A zero-trust architecture offers a secure connection to workloads with accurate user privileges, while ensuring applications have up-to-date Identity and Access Management (IAM) policies.
     

Five-Point Enterprise Strategy for Zero Trust      

Zero Trust starts with “Never trust, always verify,” but goes beyond identity and secure access. Threats can emerge externally and internally, necessitating a comprehensive risk assessment that pinpoints vital data, IT assets, potential threats, and potential attack vectors, including those originating from insiders.

See also  Three of the biggest US banks are facing a lawsuit for ‘widespread fraud’ on Zelle

Here are five critical points enterprises need to consider when implementing a zero-trust security approach:

  1. Map the data flow: It’s essential to understand which users or applications require specific access. Deploying IAM with multi-factor authentication and the principle of least-privilege access, backed by regular audits and adjustments is key.
  2. Context-based policies: The zero-trust approach assumes policies verify access requests based on context. This includes the user identity, the device the request is coming from, the location of the request, the type of data to be accessed, and the application being accessed. This ensures that only those with established ‘reason’ can access specific assets and prevents an ‘untrusted’ network from gaining access to workloads and data it is not entitled to.
  3. Reduced attack surface: Because users are connecting directly to applications and other resources they need, they are not connecting to a network. This eliminates lateral movement and prevents compromised devices from infecting other resources. With this architecture, the applications are invisible to the internet, so they can’t be discovered and attacked individually.
  4. Make employees security aware: To achieve optimal results, it is essential that all employees fully understand and adhere to proper security practices. Rigorous training programs must be implemented to ensure everyone is equipped with the knowledge and skills to verify before trusting. Training needs to be an ongoing process, and tests should be run regularly to measure improvement and see who might need more focused training.
  5. Test via mock drills: In all environments, it’s imperative to have plans for implementing patches for discovered vulnerabilities updates across tools with a process to understand the impacts on other security tools and for incident response. However, simply having a plan is not always sufficient. Red team and purple team drills should be conducted regularly. Most importantly, tabletop drills for incident response need to be executed regularly so that all parties understand their roles in the event of an attack, and, in the worst case, how to execute a cyber recovery.
See also  Guide to Migrating From VMware | DCN

These actions will help organizations ensure consistent verification, preparedness, and preparation for attacks that will happen, regardless of the defenses in place.

By the time you finish reading this article, a hacker could have attempted to access privileged or critical information through a phishing attack, malware, or social engineering maneuvers.

The need of the hour is a security strategy where policies are applied based on the context of least-privileged access and strict user authentication – not assumed trust. In other words: never trust, always verify.


George Symons is Vice President of Strategy for Cloud, Infrastructure, and Security at Persistent Systems.

Source link

Contents
Paranoia is good: Why Zero Trust is the Need of the HourLaying the Groundwork for Zero TrustFive-Point Enterprise Strategy for Zero Trust      
TAGGED: Countering, Cyber, DCN, error, Human, Stemming, threats, Trust
Share This Article
Twitter Email Copy Link Print
Previous Article Atom Computing Says Its New Quantum Computer Has Over 1,000 Qubits Atom Computing Says Its New Quantum Computer Has Over 1,000 Qubits
Next Article Protesters block traffic as they participate in a "car caravan" protest at the Amazon Spheres to demand the Seattle City Council tax the city Cloud, Data, and Political Protests Mark the 2022 AWS Summit | DCN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

The Data Centre Alliance appoints Mike Meyer to Executive Board

Based in 2010, the DCA is the UK Commerce Affiliation representing the whole knowledge centre…

March 23, 2025

BEKhealth Raises $4M in Funding

BEKhealth, a Analysis Triangle Park, NC-based AI-powered chart abstraction and patient-matching platform firm, raised $4M…

February 15, 2025

TigerConnect Acquires Twiage

TigerConnect, a Santa Monica, CA-based a supplier of a scientific collaboration platform in healthcare, acquired…

November 25, 2024

Inaugural National Data Centre Day set for September 12

September 12, 2025 marks the very first Nationwide Knowledge Centre Day (NDCD) – a brand…

August 28, 2025

Vietnam: National Data Strategy, Data Law, and Personal Data Protection Law — The start of a comprehensive transformation in data policy landscape in Vietnam

In short The phrases “knowledge” and “digital knowledge” have prominently surfaced within the discussions of…

March 18, 2024

You Might Also Like

Digital transformation concept. Binary code. Programming. Quantum computer.
Global Market

Quantum Elements cuts quantum error rates using AI-powered digital twin

By saad
Cyber Security & Cloud Congress North America
Cloud Computing

Cyber Security & Cloud Congress North America 2026

By saad
Gap between cyber strategy and business strategy is costly
Global Market

Gap between cyber strategy and business strategy is costly

By saad
Commvault Geo Shield: strengthening data sovereignty and cyber resilience
Colocation

Commvault Geo Shield: strengthening data sovereignty and cyber resilience

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.