Zero Trust Architecture

There has been a lot of talk recently about Zero Trust Architectures and what this means in the new ‘Work From Home’ approach being adopted by companies during the pandemic.

Zero Trust, Zero Trust Network, or Zero Trust Architecture refer to security concepts and threat model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access.

We are preparing a series of blogs on this subject, but in the meantime please view this short video from Hacker Combat and review the blogs we have picked below.

Hacker Combat – Zero Trust Architectures

Blog Posts

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems… Continue Reading →

Router Vulnerabilities

Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network – namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot… Continue Reading →

Securing your Remote Desktop

This is an extension to my blog Productive and Secure Remote Working and Cyber Security during a Pandemic where I just want to describe an emerging cyber threat relating to home working and in particular remote desktop access. When we are in the office we are protected by a number of systems and firewalls. Our individual PC’s… Continue Reading →

Securing your Internet Router – A Pocket Guide

Your connection to the Internet is the most vulnerable part of your online existence. It is on the edge of your network and is the front facing interface to all the major cyber threats. In particular the following common threats exist and take advantage of badly configured routers: Default settings passwords allowing someone to hack… Continue Reading →

Productive and Secure Remote Working

Over the past few weeks, we have all had to consider working from home (no need to say why unless you have been living under a rock). This guidance post is about how you can work from home securely and productively. Setting up the Environment Ideally you need a room you can yourself up in,… Continue Reading →

Loading…

Something went wrong. Please refresh the page and/or try again.


Headline image provided by Gerd Altmann from Pixabay

Create a website or blog at WordPress.com

Up ↑