Cybercrime Could Cost Businesses $6 Trillion. Are You Prepared? [Infographic]

By Brian Wallace

In the olden days of information security the main line of defense against hackers was to keep them out of your network as long as possible. This method was known by many names – the crunchy outer shell method or the moat around the castle method. Either way this method’s biggest failure was its unrealistic expectation that humans could operate in such a way that they never made a mistake or took a shortcut.

In reality people make mistakes. They reuse passwords when they know they shouldn’t because they want to be able to remember them or at least guess easily. They use simple passwords even when they know better because they are lulled into a false sense of security believing they would never be a hacker’s target. In fact, everyone is a hacker’s target with no exceptions.

Because everyone is a target and people make mistakes, zero trust has become the new gold standard in network security protocols. There’s still a moat or a crunchy layer on the outside of the network, but instead of everything inside being open to anyone who can get in, these days it’s just more crunchy shells on the inside.

Network segmentation works under the premise that eventually hackers will be able to get in, and you want to be able to limit the damage they can do once they have gained access as well as detect their presence as quickly as possible.

So what if you have a small or medium business and you can’t afford a full time CSO to manage your network? Fortunately there are solutions for this in the form of NaaS providers who can build and maintain your networks as well as inspect traffic logs and detect threats.

Learn more about the latest information security protocols for networks from this infographic.

Infographic source: Tufin

Go to the full article.

Source:: Business 2 Community

Be Sociable, Share!