05/07/2021 | News release | Distributed by Public on 05/07/2021 13:11
You can't stop every threat, but you can mitigate damage with a zero-trust architecture.
The biggest cyber attacks of 2020 have raised new concerns around enterprise security postures, practices, and policies.
Would things have been different if so many enterprises hadn't been forced to rush into a largely virtual arena? Or, had the writing already been on the wall before the pandemic?
Below are five of the most significant cyber attacks of 20201.
In a world of continuously evolving, increasingly advanced threats, who can you trust?
Nobody. A comprehensive zero-trust architecture requires each person, device, unit of data, network, and workload to earn and maintain your trust before being granted access. Could a zero-trust architecture have prevented the top 2020 cyber attacks? Not likely. While your goal may be completely preventing all cyber attacks, cyber criminals are sophisticated, well-funded, and produce continuously evolving, novel threats. You need to build in threat mitigation for when a breach occurs.
From reducing your attack surface to slowing the pace of the attack and stopping the breach from spreading, mitigation can mean the difference between one employee losing a day's work on their laptop versus an entire company having critical operations shut down, losing customers, damaging their reputation, and costing millions of dollars.
Slow the spread of an attack
Without zero trust, an attacker can breach a single trusted endpoint and run rampant from that single foothold. With zero trust, it's exponentially harder for the attack to progress from its beachhead. Even if the attacker breaches a machine, that machine still isn't trusted. So, when the attacker starts trying to look around your network, they don't have total visibility. And they'll have to go through the same difficulty of breaching their next target in your system.
While it's not as simple to say the attack goes away, the pace of that attack slows. In doing so, the impact at any given time is magnitudes less. Defending security teams will pick up on the increased activity, which signals an attack is underway, and will have more time to contain and remediate.
Cisco Customer Experience (CX) offers expert Zero Trust services
Zero trust is a cultural shift, an architectural philosophy as much as it is a standard. It canvases your entire enterprise and comprises a number of technologies - a holistic approach to preventing and containing security breaches. This strategic approach to your security is achieved over time. But your Cisco® Zero Trust journey can start today with Cisco CX.
Cisco CX supports your Zero Trust journey with leading experts in security, networking, and IT - all the key areas you need to mitigate threat damage via Cisco's three central pillars of Zero Trust:
While it's not a simple switch you can flip, your organization probably already has latent Zero Trust capabilities. Cisco CX can help you fully capitalize on those capabilities and get the most from your existing and future investments via a vendor-agnostic approach.
To learn more, visit Cisco Zero Trust Strategy and Analysis Service and Business Critical Services for Security. You can also contact your Cisco sales representative or Cisco authorized partner for assistance.
https://searchsecurity.techtarget.com/news/252494362/10-of-the-biggest-cyber-attacks
Source: IBM Security and Ponemon Institute Cost of a Data Breach Study
Share: