{"id":5315,"date":"2021-03-09T11:03:08","date_gmt":"2021-03-08T22:03:08","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=5315"},"modified":"2021-03-09T11:03:08","modified_gmt":"2021-03-08T22:03:08","slug":"zero-trust-it-security","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=5315","title":{"rendered":"Zero-Trust IT Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>&#8216;Zero-Trust&#8217; is a tough headline. Zero-trust in a world where we trust people all the time is an unpleasant concept.<\/p>\n<p>We trust that when we order a package online, that the vendor will take our order and not just our money, that our product will be passed to a courier that we trust will take care of our product and deliver it safely, and we trust that when it is delivered to our door, that no one will take it before we can collect it.<\/p>\n<p>We trust that when we buy our morning coffee, it won\u2019t just taste the best, but that it will be made hygienically, the cups are clean, and the milk is fresh. When we come to work, we trust that other people will obey the traffic laws, so we\u2019ll be safe. If we are being driven, we trust that the driver knows what they are doing, that they are fresh and alert, rather than recovering a big night the day before.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-5316\" src=\"https:\/\/new.kinetics.co.nz\/wp-content\/uploads\/2021\/03\/ZeroTrustURL.png\" alt=\"\" width=\"463\" height=\"472\" \/><\/p>\n<p>But with our vital IT systems, we KNOW that cyber-criminals are coming at us literally all the time. They are either hand-crafting attacks at us, or using hyper-scale computing to direct sophisticated tools against us.<\/p>\n<p>As an IT services business, we\u2019re spending more and more of our time focused on keeping clients safe. I continue to be amazed by the organisations that don\u2019t think this is important, even as they see increasing numbers of attacks.<\/p>\n<p>As our Chief Technology Officer, Bill Lunam, showed us at an internal exercise the other day, we\u2019re diligent at locking the physical doors, applying deadlocks and turning on the alarm, even though we\u2019ve all seen relatively few of these incidents. By contrast, even though we\u2019re seeing and reading about IT security events continually, from phishing and whaling to intercepted emails, many businesses remain reluctant to step up their data protection.<\/p>\n<h2>It\u2019s madness!<\/h2>\n<p>&nbsp;<\/p>\n<p>Forrester Research tell us that we should always be assuming a breach, never trusting anything and always verifying. While we can, and we must, use tools to assist us, the number one risk remains people, and how we behave.<\/p>\n<p>We have to ensure our processes are secure, for example checking emails \u2013 especially financial ones \u2013 are from the person we think, and we warned recently of one stunning local story &#8211; <a href=\"https:\/\/new.kinetics.co.nz\/bank-account-fraud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/new.kinetics.co.nz\/bank-account-fraud\/<\/a><\/p>\n<p>For example, when you access a web URL link, how can you be sure it is genuinely who you think it, or that the site is not infected with malware? Whether someone has forwarded you the link by email, or through social media, or you\u2019ve found it in an online search, how can you be sure it\u2019s safe?<\/p>\n<p>Tools like the URL curation we include in KARE for Security help you identify potential risks \u2013 ironically, a search on Zero-Trust itself resulted in at least one \u2018dodgy\u2019 site which, as expected, our KARE URL curation software warned us about.<\/p>\n<h2>The Cloud changes security risks<\/h2>\n<p>Before the cloud, we could protect an organisation by focusing on the corporate firewall and scanning emails. Today, things have changed. We are working from anywhere, especially from home in this Covid-world.<\/p>\n<p>The PC we use might be shared by other family members. It might be as likely to be used for your business emails and tools as it is for online ordering and click and collect shopping. You are accessing tools from your phone, and both that and your PC might also have your personal email, your social media, a personal file-sharing tool. You might be part of a community organisation that shares work on their own platform.<\/p>\n<p>The idea that we can filter that non-work material work out seems impractical to me, so it makes sense that the end-point \u2013 phone or PC \u2013 needs to be our focus.<\/p>\n<ul>\n<li>Check that all the email services you use are \u2018washed\u2019 \u2013 ideally with an ATP tool<\/li>\n<li>Take inventory the tools you have on your PC &amp; phone and remove the ones you don\u2019t need<\/li>\n<li>Don\u2019t trust social media content (honestly \u2013 this one seems pretty obvious, but that can extend to links on mainstream media sites as well)<\/li>\n<li>Protect the BUSINESS tools by keeping all your work content on secure work platforms only \u2013 don\u2019t share work file content with personal accounts such as Dropbox.<\/li>\n<li>Keep your own devices encrypted (e.g. with KARE for Security)<\/li>\n<\/ul>\n<p>We\u2019re keeping up our commitment to help you minimise your risk with <a href=\"https:\/\/new.kinetics.co.nz\/cybersecurity\/\">KARE for Security<\/a> to add further layers of protection including many of the new Microsoft 365 data protection tools.<\/p>\n<p><strong>Reference :<\/strong><a href=\"https:\/\/www.forrester.com\/report\/A+Practical+Guide+To+A+Zero+Trust+Implementation\/-\/E-RES157736?objectid=RES157736\">A Practical Guide To A Zero Trust Implementation (forrester.com)<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;Zero-Trust&#8217; is a tough headline. Zero-trust in a world where we trust people all the time is an unpleasant concept. We trust that when we order a package online, that the vendor will take our order and not just our money, that our product will be passed to a courier that we trust will take [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"It is a tough heading. Zero-trust in a world where we trust people all the time. We trust that when we order a package online, that the vendor will take our order and not just our money, that our product will be passed to a courier that we trust will take care of our product and deliver it safely, and we trust that when it is delivered to our door, that no one will take it before we can collect it.\n\nWe trust that when we buy our morning coffee, it won\u2019t just taste the best, but that it will be made hygienically, the cups are clean, and the milk is fresh. When we come to work, we trust that other people will obey the traffic laws, so we\u2019ll be safe. If we are being driven, we trust that the driver knows what they are doing, that they are fresh and alert, rather than recovering a big night the day before.\n\nBut with our vital IT systems, we KNOW that cyber-criminals are coming at us literally all the time. They are either hand-crafting attacks at us, or using hyper-scale computing to direct sophisticated tools against us.\n\nAs an IT services business, we\u2019re spending more and more of our time focussed on keeping clients safe. I continue to be amazed by the organisations that don\u2019t think this is important, even as they see increasing numbers of attacks.\n\nAs our colleague Bill showed us at an internal exercise the other day, we\u2019re diligent at locking the physical doors, applying deadlocks and turning on the alarm, even though we\u2019ve all seen relatively few of these incidents. By contrast, even though we\u2019re seeing and reading about IT security events continually, from phishing and whaling to intercepted emails, many businesses remain reluctant to step up their data protection.\n<h2>It\u2019s madness!<\/h2>\nForrester Research tell us that we should always be assuming a breach, never trusting anything and always verifying. While we can, and we must, use tools to assist us, the number one risk remains people, and how we behave.\n\nWe have to ensure our processes are secure, for example checking emails \u2013 especially financial ones \u2013 are from the person we think, and we warned recently of one stunning local story -[wow_colorme] <a href=\"http:\/\/kinetics.co.nz\/bank-account-fraud\" target=\"_blank\" rel=\"noopener\">http:\/\/kinetics.co.nz\/bank-account-fraud<\/a>[\/wow_colorme]\n\nFor example, when you access a web URL link, how can you be sure it is genuinely who you think it, or that the site is not infected with malware? Whether someone has forwarded you the link by email, or through social media, or you\u2019ve found it in an online search, how can you be sure it\u2019s safe?\n\n<a href=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2021\/03\/ZeroTrustURL.png\"><img class=\"alignright size-full wp-image-5316\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2021\/03\/ZeroTrustURL.png\" alt=\"\" width=\"463\" height=\"472\" \/><\/a>Tools like the URL curation we include in KARE for Security help you identify potential risks \u2013 ironically, a search on Zero-Trust itself resulted in at least one \u2018dodgy\u2019 site which, as expected, our KARE URL curation software warned us about.\n\nBefore the cloud, we could protect an organisation by focusing on the corporate firewall and scanning emails. Today, things have changed. We are working from anywhere, especially from home in this Covid-world.\n\nThe PC we use might be shared by other family members. It might be as likely to be used for your business emails and tools as it is for online ordering and click and collect shopping. You are accessing tools from your phone, and both that and your PC might also have your personal email, your social media, a personal file-sharing tool. You might be part of a community organisation that shares work on their own platform.\n\nThe idea that we can filter that non-work material work out seems impractical to me, so it makes sense that the end-point \u2013 phone or PC \u2013 needs to be our focus.\n<ul>\n \t<li>Check that all the email services you use are \u2018washed\u2019 \u2013 ideally with an ATP tool<\/li>\n \t<li>Inventorise the tools you have on your PC &amp; phone and remove the ones you don\u2019t need<\/li>\n \t<li>Don\u2019t trust social media content (honestly \u2013 this one seems pretty obvious, but that can extend to links on mainstream media sites as well)<\/li>\n \t<li>Protect the BUSINESS tools by keeping all your work content on secure work platforms only \u2013 don\u2019t share work file content with personal accounts such as Dropbox.<\/li>\n \t<li>Keep your own devices encrypted (e.g. with KARE for Security)<\/li>\n<\/ul>\nWe\u2019re keeping up our commitment to help you minimise your risk with KARE for Security and we\u2019re now stepping that up with a more intense plan called KARE for Security 2 to add further layers of protection including many of the new Microsoft 365 data protection tools.\n\n<strong>Reference :<\/strong>[wow_colorme]\u00a0<a href=\"https:\/\/www.forrester.com\/report\/A+Practical+Guide+To+A+Zero+Trust+Implementation\/-\/E-RES157736?objectid=RES157736\">A Practical Guide To A Zero Trust Implementation (forrester.com)<\/a>[\/wow_colorme]\n\n&nbsp;","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-5315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/5315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5315"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/5315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}