October 6, 2022
Andrii Yalanskyi/Shutterstock.com Many cyberattacks rely on the level of access legitimate users have on computer networks. Breach the perimeter and you’ve got the keys to the castle. With a zero-trust approach to security, merely getting through the door isn’t enough anymore. Traditional Perimeter-Based Security In a traditional security setup, there’s a built-in assumption that anyone…

Andrii Yalanskyi/Shutterstock.com

Many cyberattacks rely on the level of access legitimate users have on computer networks. Breach the perimeter and you’ve got the keys to the castle. With a zero-trust approach to security, merely getting through the door isn’t enough anymore.

Traditional Perimeter-Based Security

In a traditional security setup, there’s a built-in assumption that anyone with legitimate access credentials is a trusted actor. Remember that line from Star Wars? The one that goes, “It’s an older code, sir, but it checks out.”? That’s the sort of security we’re talking about here.

This is why you need to use a VPN for public Wi-Fi. The way Wi-Fi is designed, there’s an assumption that anyone with a Wi-Fi password is a trusted actor. They can see the activity of other network users and access network-connected devices. This is also why you should encourage the use of the guest network feature of your router instead of handing out your Wi-Fi password to everyone who visits your home!

This is sometimes referred to as “perimeter-based” security, where anyone…

Read Full Article Source

Leave a Reply

Your email address will not be published.