Intelligent CIO LATAM Issue 04 | Page 45

CIO OPINION
The solution to protecting information is called Zero Trust . With this model , the implicit trust that everything within a corporate network is safe disappears , and we start from the principle – apparently paradoxical – that to trust we must distrust . permissions to information are only granted to meet specific objectives , from the appropriate environment and on secure devices to compartmentalize risks , limiting the amount of data to a potential attacker who has managed to overcome the entry barriers .
Companies that operate with a Zero Trust mindset are more resistant to cyberattacks . The first line of defense is in access to the organization ’ s platforms . Any access request must be evaluated and verified as a potential risk , because , in reality , it is : More than 90 % of attacks are caused by human error , and the gateway to the system must be the most monitored . Multi-factor authentication ( MFA ) for all users at all times is a critical factor .
Zero Trust and strategy
But verifying identity secures only the point of entry to the network . Establishing minimum privileges for access to information is also essential : access
As a complement to access , it is necessary to secure the devices of collaborators . Old operating systems or vulnerable applications on personal computers are
Remote work , from any device and any network , with access to insecure applications in unprotected environments have become the achilles heels of cybersecurity .
www . intelligentcio . com INTELLIGENTCIO LATAM 45