Digitalisation World - ISSUE VI 2021

Page 28

CYBER SECURITY

Authentication best practice within a Zero Trust strategy For CISOs around the world it seems at every turn, they are being told to implement Zero Trust. BY NIC SARGINSON, PRINCIPAL SOLUTIONS ENGINEER, YUBICO IT’S TRUE that the principle of Zero Trust might be right for this moment; after all, work-from-home and hybrid work policies are becoming the norm, as are cloud applications. However, many organisations may struggle with the reality of what’s involved with a Zero Trust framework or infrastructure. Having protected the boundary for so long, it takes a change of mindset to verify every connection attempt. At its core, Zero Trust should start with strong user authentication and the chosen authentication method should not hamper user productivity. Therefore, organisations need to look first at how users establish their identity and consider the level of trust that can be attributed to that mechanism. The truth is, if authentication is by passwords alone, there is no

28

WWW.DIGITALISATIONWORLD.COM

l

ISSUE VI 2021

l

assurance of security, no matter how robust the rest of the Zero Trust strategy is. Yet despite this, a recent survey of work-from-anywhere cybersecurity practices at companies in the UK, France and Germany revealed that less than a quarter (22%) of respondents had implemented two-factor authentication (2FA). That’s a problem for Zero Trust, because going forward with such a model depends on having a strong level of trust in the authentication mechanisms of every user, from every device. Strong authentication needs to be a foundational building block of the Zero Trust strategy. With that in mind, what are the key strong authentication best practices organisations need to adopt in order to ensure Zero Trust is correctly supported?

COPYRIGHT DIGITALISATION WORLD


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Canal Extremadura’s IT infrastructure revamp with Quantum

19min
pages 58-66

Transforming enterprise system moinitoring

4min
pages 54-55

Is your network holding up your digital transformation?

5min
pages 50-51

Moving from a traditional to dynamic public cloud infrastructure

5min
pages 52-53

Integration 101: How to solve the biggest unsolved challenge of IT

4min
pages 48-49

Why Low code is the perfect business transformation cherry picker

6min
pages 46-47

The revolution in IT service management is a big bonus for boardrooms

4min
pages 42-43

The new era of digital experience management

4min
pages 44-45

Observability is not one size fits all

5min
pages 30-31

You have a remote workforce: What now?

4min
pages 24-25

Authentication best practice within a Zero Trust strategy

4min
pages 28-29

Maximising Your Fibre Network ROI

5min
pages 22-23

Citrix research reveals employee experience is about to break

2min
page 10

McAfee research highlights threat trends

4min
page 9

Pandemic exposes significant disconnect between IT and the wider business

3min
page 6

Organisations to spend almost $656 billion on Future of Work technologies

18min
pages 12-19

Putting faith in a flexible future

3min
page 8

Meeting the demands of a digital-first future

3min
page 7

Current data architectures in danger of crumbling

3min
page 11

The future of the workplace is digital Here’s how to nail it

4min
pages 20-21
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.