by Simon Moran
Posted on January 3, 2023
Want to interview Simon?Contact
It’s the season for resolutions that we all really, truly and sincerely mean to stick to – even beyond January 6th.
Instead of (or perhaps in addition to) the usual “exercise more, eat less junk food, watch less TV” goals, this year we’re proposing some cybersecurity resolutions that are guaranteed to enhance the Zero Trust posture of your organization. And we’re ready to help you follow through on them.
Phishing is specifically and expertly designed to trick users. So why would any reasonable person think that telling users to look for phishing emails is a good idea for how to protect yourself from phishing?
In a recent report, a company that specializes in anti-phishing training quantified their success by showing that after a full year of training, the percentage of users likely to click on a phishing link dropped from the 35% range to 3-5%. Impressive, right? That is, until you consider the vast quantities of phishing emails and social media links that users are exposed to every day. If every enterprise user clicks through just 3% of the time, and provides credentials in even a fraction of those cases, the exposure is still vast.
This year, resolve to protect your users from phishing and by doing so, protect your business as well. With ZTEdge Web Isolation, untrusted sites are opened in read-only mode to keep users from entering credentials or clicking on malicious links, without frustrating them in cases where the site is legit and contains content they need to see.
Not even the Shadow knows what evil lurks on the drives of unmanaged devices. Yet every day, millions of employees access workplace apps via their BYOD devices and at least as many 3rd party consultants do the same from laptops and desktops that are, at best, managed only by their direct employer.
Unmanaged devices may be infected with malware that can infect your private cloud applications, steal credentials and MFA browser cookies when users log in to SaaS enterprise apps or steal sensitive data. Users may leverage browser functions to download data on their devices for work – or for less innocent purposes.
Protecting your network from the cybersecurity risks of unmanaged 3rd party and BYOD devices is a worthwhile goal for this year, especially since ZTEdge Web Application Isolation (WAI) makes it easy to do. Our innovative, clientless ZTNA solution empowers organizations like yours to enforce user-level policy controls without requiring users to install any software on their personal or 3rd party devices. Learn how it works and stop unmanaged device risk from threatening your organization.
Virtual meeting applications, like Zoom, Microsoft Teams and Google Meet, have limited security controls. These apps can leave sensitive corporate data vulnerable to exposure and exfiltration and enable hackers to find IP addresses by which they can penetrate into your systems to spread malware.
Almost 3 years after the pandemic made Zoom a collaboration lifeline, most organizations still lack the controls to prevent protected data from being exposed in screen shares, chats and even video feeds. ZTEdge Virtual Meeting Isolation is the only RBI solution to enable seamless isolation-based protection of all virtual meeting functions. It provides a simple way to control data sharing via virtual meetings, including blocking PII in chats, and prevent exposure of user IP addresses. Resolve to look into securing your virtual meetings as soon as you’ve caught up with the holiday backlog.
More than ever before, applications are being targeted by sophisticated attacks. With the move to cloud native, apps are being deployed more quickly, and with more open-source code within, than ever before. Web-facing app vulnerabilities have become one of the most common vectors for cyberattacks.
Web application firewalls (WAF) have been the go-to choice of organizations that want to protect their apps from attack. But WAFs both under- and over-perform: On the one hand, they rely on pattern and rule-based engines that fail to detect many threats. On the other, they issue so many false alerts that the vast majority of organizations run them in alert-only mode, leaving apps exposed in real time.
Your final Zero Trust resolution should therefore be to add effective tools for protecting apps from attack. Web application isolation (WAI) darkens web and cloud app surfaces and makes them invisible to bad actors seeking to find vulnerabilities that they can exploit or misconfigurations that allow them to gain access. Only users that are authenticated and authorized via the organization’s ZTEdge cloud tenant can access corporate applications, so even hackers with stolen credentials cannot get in.
The trends of the past few years – cloud native apps, work from home, and Zero Trust security – are changing the business environment in fundamental ways. If you’re depending on old security solutions, you’re putting your business at risk. Contact us now to learn how to turn your Zero Trust resolutions into reality.
Using black hat SEO to achieve high rankings for particular search terms, threat actors can sit back as victims flock to their malware-infected websites.
As one of the keys to implementing least-privilege access, microsegmentation is an essential element in the Zero Trust toolbox.
In this post, we update the layered security concept for the age of Zero Trust, cloud computing, application-based work and work-from-anywhere.