The Zero Trust mindset for optimal protection

Are you an organisation that has an online investment or property to protect? Adopt the zero trust philosophy to ensure that all your data, assets, and resources are free from potential threats.

FacebookTwitterLinkedIn
The Zero Trust mindset for optimal protection

In today's digital world where advancements in technology can empower not only innovators but also cybercriminals, cyberattacks have been rampant and continually on the rise.

In fact, Asia Pacific saw a 168% increase in cyberattacks in 2021 alone, with 80% of the cases reported to be ransomware. This has led to 51% of organisations and businesses paying to regain their stolen data, assets, and resources.

One way to help protect anyone with an online investment or property and to increase their cybersecurity is to adopt a zero trust philosophy. Zero trust is “a security concept centered on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.”1

What is Zero Trust Security?

Developed by analyst John Kindervag in 2010, a zero trust network monitors, limits, controls, verifies, and secures all network traffic and resources.2 It teaches users to “never trust, always verify,” ensuring that “every access request is fully authenticated, authorized, and encrypted before granting access.”3

The minimum requirements for an adoption of zero trust include: identity, devices and workloads, and least privilege access.4

Identity. Identity defines the existing zero trust security policies managing access across all users and privileged accounts. The use of multifactor authentication and biometrics must also be implemented to ensure strong authentication for user-backed identities.

Devices and workloads. Defend the organisation with zero trust security practices—from data and applications to endpoints. All device types and operating systems must meet a required minimum health state as a condition of access

Least privilege access. Monitor the behavior of all users, resources, and data connecting within the business, and resolve issues that arise.

Having a zero trust framework in any company, especially those in major industries such as education, healthcare, logistics, and retail, is crucial. With high-value data like research, personal information, and intellectual property, zero trust security protects users and communities from being targeted by malicious and dangerous attacks.

How can businesses adopt Zero Trust Security?

To successfully adopt a zero trust philosophy, all users and decision makers must be on board in terms of narrowing and aligning on access policies, securing connections, and providing access and sharing data.

Simply put, adopters must implement the three basic principles: 1) verify data points explicitly, 2) use least privileged access, and 3) assume breach.

They must also specifically implement the following5:

● Knowing all applications and services, and understanding the workflows.

● Classify data

● Mapping how technologies interact, and isolate and protect workloads during any transmission.

● Improve defences and establish monitoring schedules

● Perform maintenance

Zero trust security is hard to achieve without a reliable partner that can ensure round-the-clock protection. To truly adopt and maximise the model and to strengthen your organisation’s cybersecurity, it’s necessary to have a partner like Singtel.

Having a reliable partner also makes top zero-trust-related security technologies available to enterprises. An improved security architecture is needed to secure any network’s edge and cloud environments. Secure Access Service Edge, or SASE (pronounced “sassy”), is the key. SASE is a cloud-based enterprise security framework, which reduces complexity, improves agility, and empowers multi-cloud networking.

When organisations and businesses use SASE, which is embedded with the zero trust approach, their cybersecurity systems are transformed and strengthened for the better. SASE means “organizations do not have to stand up separate infrastructure to address both internet and private applications, as was once the case with conventional proxy- and software-defined perimeter products.”6

For instance, organisations in the healthcare industry can greatly benefit from having SASE. As it provides security and access for select users using direct internet and cloud-based storage and delivery, even remote clinics and patients’ homes can enjoy full security capabilities. Sending and receiving medical data is safer, faster, and more cost-efficient.

Why is zero trust important right now?

As the online world gets more complex and with many people across the globe working remotely, there are more ways and possibilities that advanced cyberattacks and cybercrime can happen. Some of them can even come from both outside of the network and within the network itself. To protect data from today’s threats, it is imperative that organisations adopt a zero trust framework.

Further, in a report by Gartner, 60% of organisations are predicted to use zero trust security by 2023 to improve their cybersecurity and make their systems more cyber resilient.7 These entities will benefit from a “stronger network security, streamlined network management, reduced costs associated with deploying security at scale, and a single, holistic view of the entire network.”8 With the ever-changing landscape of cyberspace, companies can run their businesses with ease and peace with zero trust.

Strengthen your organisation’s cybersecurity now.

Reference:

1. CSO, What is zero trust? A model for more effective security, 2018.

2. Help Net Security, Zero Trust creator talks about implementation, misconceptions, strategy, 2021

3. Microsoft. Embrace proactive security with Zero Trust.

4. IBM, What is zero trust?

5. Security Scorecard. What is Zero Trust Architecture? 9 Steps to Implementation, 2021.

6. Prisma by Palo Alto Networks, How Zero Trust and SASE Can Work Together

7. Gartner, Gartner Unveils the Top Eight Cybersecurity Predictions for 2022-23, 2022

8. Prisma. How Zero Trust and SASE Can Work Together.

You may also like

Bridging the cyber talent gap: Why training matters as much as hiringShare
Apr 2025 | -
cyber security
Bridging the cyber talent gap
Singapore is tackling the cyber talent shortage by creating new ways for people to enter and grow in the field—no tech background needed. With industry-led training and support from key industry players, these programmes focus on real-world skills and practical readiness, helping build a stronger, more resilient cyber security workforce for the nation’s digital future.
How Southeast Asia got on board with the green portShare
Apr 2025 | -
sustainability
How Southeast Asia got on board with the green port
Six of the world's ten most efficient ports are in Asia. As a leader in port innovation through technology, Southeast Asian ports are meeting increasing demands and operating effectively despite increasing uncertainty. Digital twins, automation and network slicing are key enablers in this shift.
High speed, low power: How 5G is a sustainability tour de forceShare
Apr 2025 | -
sustainability
How 5G is a sustainability tour de force
The high speed and low latency of 5G are opening up more opportunities for innovative technology applications. The lower-energy network also makes it a logical enabler of sustainability, and companies are using it to reduce energy use, monitor emissions and protect natural environments.