Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

3 min read

Security Awareness Campaigns And Zero Trust

Security Awareness Campaigns And Zero Trust

In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in order to be successful. In this post, we look at why passwords can derail a security concept and how the Zero Trust concept can help solve it.

 

Why are security policies circumvented despite the security awareness campaigns & concepts?

Despite security awareness, no matter how well taught an employee is, they will still bypass security policies if their productivity is affected. In many cases, the introduction of new security measures fails not because the workforce does not understand the risks, but because the process, technology, or both, are too cumbersome. As a result, users prefer to look for ways to overcome technical limitations and risk choosing their own insecure path.

In the worst case, this results in shadow IT - employees spend valuable time searching for workarounds and increase the risk of exposing or losing sensitive data.

Security awareness campaigns are therefore only moderately successful if the technical requirements and processes are not in place.

 

The authentication with passwords

Security Awareness Campaigns PasswordsOne of these obstacles is passwords for authentication. Passwords are still widely used to protect digital resources and data. But they are also the cause of many cyberattacks. According to the Cost of a Data Breach Report 2021 by IBM, 20% of data breaches are due to compromised credentials. Individuals unfortunately tend to use weak passwords that are easy to remember.
These "circulate" in large numbers on the dark web after a successful attack: The number of stolen usernames and passwords there increased by 300% from 2018 to 2020.
Once the attacker has captured the credentials, he can move through the company unnoticed.  

Companies should therefore consider other factors for Identity & Access Management (IAM) and adopt a Zero Trust approach to authentication. 

The goal should be to move away from password to passwordless authentication.


From Single Sign On to Passwordless Authentication

The first improvement of password-centric authentication can be the introduction of Single Sign On (SSO) methods. This reduces the frequency of password entry and also the number of passwords required. The shift to remote working (work from home) has led many companies to introduce at least basic Two-Factor Authentication (2FA) with one-time passwords via SMS.

Next step, companies could use another factor in conjunction with passwords consistently for all employees, especially for privileged users and systems, e.g. digital certificates, (hardware or software-based) tokens and access cards. At a minimum, this step could replace SMS-based 2FA with application-based 2FA.

Fingerprint Biometric Procedure Cybersecurity AuthenticationAuthentication without a password is the most advanced, most secure and smoothest level of authentication. Companies use third-party digital certificates or biometric factors. Other factors can be used as an additional security measure, especially for privileged users and systems, more extensive authentication requirements should apply.

Digital transformation leads to new approaches to security: Zero Trust

With the "consumerisation of IT" (which began at the latest with the introduction of the iPhone in 2007) and the fact that the digital transformation is making companies more and more permeable, the IT landscape has changed. IT has had to relinquish competencies: Users want the freedom to manage themselves. We work from anywhere, and stakeholders interact with each other along the entire value chain.

But if companies want to successfully complete the digital transformation, taking into account the necessary IT security, they have to take the employees with them.

Forrester's Zero Trust (ZT) framework describes a modern security architecture for companies. It means moving away from the traditional perimeter-based security approach to a data-driven and identity-aware security model. Zero Trust not only improves security but has a hidden lever to improve the so-called Employee Experience (EX). After all, security and productivity are fundamental necessities for modern businesses.

What enhances the employee experience?

  • First and foremost, protect the data. Apply the principle of least privilege access. Users should not have more access than they need.
  • Allow employees to work how they want, where they want. Zero Trust allows them to work from anywhere and with any device - as long as they use a properly authenticated compliant device and in a compliant app.
  • Offer employees choices in technology by using Zero Trust as a principle to verify users, devices and apps before access. Employees who can do this (e.g., bring your own device option) have a higher EX score than those who cannot.
Employees in a holistic Zero Trust model don't launch VPN clients, don't have to remember passwords, and don't have to worry about getting their hands on files containing sensitive information not intended for them. Zero Trust solves these problems by authenticating users directly to applications, using passwordless methods, and creating access policies based on the principle of minimal privileges.

Conclusion:
Continue to focus on increasing security awareness, changing behaviour and culture. By making Zero Trust easier for your employees to work with, it becomes easier for them to integrate security into their daily lives, which in turn improves your overall security posture and culture.

Photos: iStock


DriveLock Delivers Zero Trust Platform to the Endpoint

DriveLock Delivers Zero Trust Platform to the Endpoint

The German IT security specialist supports the paradigm shift in IT security with its fully integrated Zero Trust Platform Munich, Germany. 28...

Read More
Modern Endpoint Security & EDR

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More
Enforcing The Human Firewall

Enforcing The Human Firewall

TABLE OF CONTENT WHAT IS A FIREWALL? WHAT IS A HUMAN FIREWALL? STRENGTHEN YOUR FIREWALL'S WEAKEST LINK AVOID PREVENTABLE INCIDENTS HOW...

Read More