Technology SpotLight:
Zero Trust is the New Network Security Architecture
Adopt Zero Trust Security for Your SMB

With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead to severe breaches that can damage your business. Zero Trust Security practices, however, can go a long way towards helping small and medium-sized businesses (SMBs) minimize cybersecurity risks and prevent data breaches.

Zero Trust was introduced in 2010 by John Kindervag, a former Forrester analyst. The concept has since gained wide acclaim and approval as a trusted framework for cybersecurity. The Zero Trust approach trusts nothing within or outside its perimeter and insists on verifying everything attempting to connect to the company systems before granting access. In simple terms, the National Institute of Standards and Technology (NIST) refers to it as a “never trust, always verify” approach.

Implementing Zero Trust Security within your business can help guard against data breaches, downtime, productivity loss, customer churn and reputation damage. Over 70% of businesses planned for the deployment of Zero Trust in 2020 and it is even more critical for SMBs in an era where workforces and networks are becoming heavily distributed.1

Three Misconceptions and Facts About Zero Trust Security

1.      Misconception: Zero Trust Security is only for enterprises.
The Zero Trust cybersecurity framework is a proven counterthreat strategy. While it’s true that enterprises prioritize protection of their data and networks by deploying the best solutions and approaches, SMBs must also protect sensitive data and networks by taking adequate measures to minimize internal and external vulnerabilities. Thus, Zero Trust Security isn’t just for enterprises. It is equally significant for SMBs as well.

2.      Misconception: Zero Trust Security is too complex.
By applying Zero Trust concepts at a scale that makes sense for your business, you will realize it isn’t as complex as you thought.

3.      Misconception: The cost of implementing Zero Trust is too high.
Zero Trust adoption is operationally and economically feasible if you focus on your most critical applications and data sets first.

Still Not Convinced?

Let’s look at a few statistics that should convince you of the seriousness of today’s cyberthreat landscape as well as the need for a Zero Trust approach:

Human error causes close to 25% of data breaches.2
Unfortunately, you can’t completely mistrust an external network, nor can you fully trust even a single user within your network.

Experts predict that ransomware attacks will occur every 11 seconds in 2021.3
This gives you no time to be complacent.

Over 40% of employees are expected to work from home post-pandemic.4
When this happens, many devices, users and resources will interact entirely outside the corporate perimeter. This increases the risk of an incident occurring.

Phishing attacks have increased by over 60% since the pandemic started.5
To counter such a scenario, cybersecurity policies must be dynamic and adapt to address additional concerns.

If you’re not equipped with a solid defense against cyberthreats, you may regret it later when a breach happens. If you haven’t already enacted strong cyber security measures, chances are your current approach to cybersecurity may fall short of reasonably stopping cybercriminals from accessing your network. The Zero Trust approach can change all that.
Adopting Zero Trust Security within your business does not mean you throw away your existing security tools and technologies. In fact, according to NIST, Zero Trust Security must incorporate existing security tools and technologies more systematically.
 
Build an effective Zero Trust model that encompasses governance policies—like giving users only the access needed to complete their tasks—and technologies such as:
 
1.      Multifactor authentication
2.      Identity and access management
3.      Risk management
4.      Analytics
5.      Encryption
6.      Orchestration
7.      Scoring
8.      File-system permissions
 
Taking your business down the path of Zero Trust may not be easy, but it’s certainly achievable and well worth it. Don’t worry about where and how to begin.

With SpotLink by your side, your journey becomes easier and more successful. Contact us to get started.

Source:
1.        Solutionsreview.com
2.        IBM 2020 Cost of Data Breach Report
3.        JD SUPRA Knowledge Center
4.        Gartner Report
5.        Security Magazine Verizon Data Breach Digest
 
See the online article at https://www.spotlink.com/blog/zerotrust


Product SpotLight
SpotLink Security Products and Services:

SpotLink knows how important solid, dependable cybersecurity is, and offers many products and services that can make your business more secure and robust.

IDAgent Dark Web Monitoring: When a breach happens, credentials and other personal information are stolen and traded on the dark web. SpotLink offers complementary Dark Web monitoring for all its Carefree Computing® clients. Hourly clients who are interested in knowing if their confidential information is on the dark web should contact SpotLink for pricing.

BullPhish Phishing Simulations and Training: Phishing is one of the most effective, and potentially devastating, cyber-attacks on businesses today. This phising simulation and training product can test to see which of your employees is susceptible to these attacks and provides training on how to look for phishing and prevent successful attacks. BullPhish Phishing Simulations and training is included in SpotLink Managed Security Services and many of its Carefree Computing® security add-on programs. Contact SpotLink for further information.

Microsoft Defender for 365: Previously known as Microsoft Advanced Threat Protection, this product adds additional security layers on top of Microsoft Online Protection, by adding Safe Links, Safe Attachments, and increased anti-phishing and anti-spam capabilities. $1.95 per user per month.

Cisco Duo MFA: You can add MFA (Multifactor Authentication) to your VPN, Remote Desktop, and Windows Desktop logins, making it much harder for cybercriminals to access your system even if they do have your username and password. It also provides a notification if your username and password are compromised; if someone gets an MFA request, and they are not trying to login, then that is notification someone is attempting to use their username and password. $2.95 per user per month.

BitDefender Endpoint Protection: This endpoint protection software (aka Anti-Virus) protects the security of computers using a variety of techniques and methods. SpotLink offers it in both Business Standard and High Security bundles. The High Security product includes Bitdefender’s Endpoint Detection and Response module, which collects extensive attack vector information to help identify the source of the attack and where it attempted to spread. $1.63 per device per month for Business Standard, and High Security is $4.14 per device per month.

LastPass Password Management: This product is unusual in the security field in that it both makes a business more secure AND saves their staff time. By using a Master Password vaulted store that is integrated in the web browser and with certain applications, it can make entering credentials almost effortless, while also maintaining very complex and secure passwords. $5.95 per user per month.

Datto Business Continuity: Our preferred backup system provides business continuity and disaster recovery, as well as hourly backups that are retained a year or longer. Virtual instances of your entire server infrastructure can be launched in a matter of minutes if you have a device, site, or regional disaster. Also provides rapid recovery from Ransomware infections. Pricing varies but starts at $98.75 per month for most small businesses.

Datto SaaS Protection: This provides 3 backups per day of your Office 365 (Email, OneDrive, and SharePoint), or your Google Workspace (Email, GoogleDrive) data, with a year of historical backups. This helps protect against email ransomware, as well as unintentionally deleted emails. $1.95 per user per month.

SpotLink Managed Security Services: Have internal IT management but want heightened security management and monitoring? SpotLink offers a security package that includes security firewall and endpoint protection, security management, 24/7 security monitoring and incident response. Contact SpotLink for details.

These augment and enhance the other IT services SpotLink provides locally, regionally and nationally.

Please call us at 855-SPOTLINK or email info@spotlink.com if you have any questions or want more information on any of the above products and services.
Employee SpotLight
Mark Hashim

Licensing/Accounting Supervisor

Mark is SpotLink’s Software Licensing Technologist and Accounting Supervisor. He often communicates regularly with clients and can provide useful reports on Microsoft 365 user information. He oversees client software licensing & compliance, device asset management and takes an interest in continuing to learn about IT related concepts.

Prior to Spotlink, he worked for Qualcomm Corporate Finance. He maintains an active California CPA license and gained experience as an Auditor with Deloitte. Mark has a Bachelor of Science in Business Administration with an emphasis in Accounting from the University of Vermont.  
 Need to Review Your Company's Technology Situation?

Then schedule a free video conference consultation with SpotLink's Founder and CEO, Robert Hood. With a BS in Physics/Computational Methods, an MBA in Management, and over 35 years in Software and Technology Management, in a short 30 minute consultation, he can give you a new perspective and insights on where IT fits in your organization, and how you can use it to be more profitable and competitive.
Robert Hood
Founder & CEO
SpotLink
(858) 703-5500