{"id":10922,"date":"2024-03-05T12:36:58","date_gmt":"2024-03-05T18:36:58","guid":{"rendered":"https:\/\/testing.xplaye.com\/ikusi2\/en\/?p=10922"},"modified":"2024-03-05T12:40:14","modified_gmt":"2024-03-05T18:40:14","slug":"zero-trust-a-strategic-approach-to-preventing-cyberattacks","status":"publish","type":"post","link":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/","title":{"rendered":"Zero trust: a strategic approach to preventing cyberattacks"},"content":{"rendered":"\n<p>Logically, financial institutions invest a lot of money in securing their transactions. And with good reason. It is an industry with a firm commitment to digitalization. Cybersecurity is therefore one of its biggest priorities.<\/p>\n\n\n\n<p>Organizations are increasingly exposed to cyberattacks, which are becoming ever more sophisticated. Hackers no longer seek mere notoriety; hacking is an industry in itself, and it\u2019s booming.<\/p>\n\n\n\n<p>Attacks arrive via email, by browsing on the internet and via an increasingly wide range of endpoints. With a helping hand from us, the users, being the main gateway through which cyber criminals gain access.<\/p>\n\n\n\n<p>Today, technology enables us to implement cybersecurity measures to ensure secure communication and to prevent data loss and interruption of business operations.<\/p>\n\n\n\n<p>Digitalization is advancing, and with it the number and sophistication of attacks. Cybersecurity has therefore become a critical element and a factor to be considered by any organization that wants to prevent an attack or security failure jeopardizing their data or even putting the continuity of their business at risk.<\/p>\n\n\n\n<p>Added to this growing digitalization is the change in how we use technology in business environments. Hybrid working is on the rise in organizations, connecting from multiple devices to different applications is growing at a rapid pace, and cloud solutions and services are more in demand. This makes it increasingly difficult to ensure that users can connect securely and efficiently from any device to any application without compromising security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Trust as an objective<\/h3>\n\n\n\n<p>Faced with this changing reality, it seems logical that security strategies would also change, which is exactly what is happening. One of the strategies that organizations are now adopting is Zero Trust.<\/p>\n\n\n\n<p>This concept can be understood as \u2018never trust, always verify\u2019. It extends the monitoring of the security perimeter to any location or device from which a request to access the company\u2019s network and applications is received.<\/p>\n\n\n\n<p>Up until a few years ago, the security perimeter we had to protect was within the four walls of our companies. We understood that the endpoints used to access resources were company-owned, issued and managed in fixed and predictable locations, usually on a corporate network behind a firewall. A verification method at the initial point of access was sufficient and company-managed systems with the same classification could intrinsically trust each other.<\/p>\n\n\n\n<p>However, we have gradually incorporated new hybrid and remote ways of working, with geographically distributed work teams, and we have started to use the cloud heavily to store and process data.<\/p>\n\n\n\n<p>The old security concepts have become obsolete. We have moved beyond the traditional perimeter, which is now any point from where a user wants to access corporate information resources. And this is where the Zero Trust concept comes into its own, a new cybersecurity approach that asks us to always question whether or not we should grant permission to each request for access.<\/p>\n\n\n\n<p>The aim of the Zero Trust model is to have a greater visibility of users, devices, networks and applications, since their security status is verified with each access request.<\/p>\n\n\n\n<p>In addition, the attack surface is reduced by segmenting resources and only granting permissions and traffic that are strictly necessary.<\/p>\n\n\n\n<p>Moreover, using more authentication factors, adding encryption, and marking known and trusted devices makes it more difficult for attackers to collect what they need (user credentials, network access, etc.) to access the organization\u2019s data.<\/p>\n\n\n\n<p>Finally, users can have a more productive and consistent security experience, irrespective of where they are located, the endpoints they are using, or whether their applications are on-premises or in the cloud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Logically, financial institutions invest a lot of money in securing their transactions. And with good reason. It is an industry<\/p>\n","protected":false},"author":1,"featured_media":13968,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"temas":[39],"class_list":["post-10922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN\" \/>\n<meta property=\"og:description\" content=\"Logically, financial institutions invest a lot of money in securing their transactions. And with good reason. It is an industry\" \/>\n<meta property=\"og:url\" content=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi EN\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T18:36:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T18:40:14+00:00\" \/>\n<meta name=\"author\" content=\"xplaye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xplaye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/\"},\"author\":{\"name\":\"xplaye\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13\"},\"headline\":\"Zero trust: a strategic approach to preventing cyberattacks\",\"datePublished\":\"2024-03-05T18:36:58+00:00\",\"dateModified\":\"2024-03-05T18:40:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/\"},\"wordCount\":601,\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/03\\\/zerotrust.jpg\",\"articleSection\":[\"Digital transformation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/\",\"name\":\"Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/03\\\/zerotrust.jpg\",\"datePublished\":\"2024-03-05T18:36:58+00:00\",\"dateModified\":\"2024-03-05T18:40:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/03\\\/zerotrust.jpg\",\"contentUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/03\\\/zerotrust.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero trust: a strategic approach to preventing cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\",\"name\":\"Ikusi EN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13\",\"name\":\"xplaye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g\",\"caption\":\"xplaye\"},\"sameAs\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\"],\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/author\\\/xplaye\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN","og_description":"Logically, financial institutions invest a lot of money in securing their transactions. And with good reason. It is an industry","og_url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/","og_site_name":"Ikusi EN","article_published_time":"2024-03-05T18:36:58+00:00","article_modified_time":"2024-03-05T18:40:14+00:00","author":"xplaye","twitter_card":"summary_large_image","twitter_misc":{"Written by":"xplaye","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/"},"author":{"name":"xplaye","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13"},"headline":"Zero trust: a strategic approach to preventing cyberattacks","datePublished":"2024-03-05T18:36:58+00:00","dateModified":"2024-03-05T18:40:14+00:00","mainEntityOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/"},"wordCount":601,"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2024\/03\/zerotrust.jpg","articleSection":["Digital transformation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/","name":"Zero trust: a strategic approach to preventing cyberattacks - Ikusi EN","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2024\/03\/zerotrust.jpg","datePublished":"2024-03-05T18:36:58+00:00","dateModified":"2024-03-05T18:40:14+00:00","author":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13"},"breadcrumb":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#primaryimage","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2024\/03\/zerotrust.jpg","contentUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2024\/03\/zerotrust.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/zero-trust-a-strategic-approach-to-preventing-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/testing.xplaye.com\/ikusi2\/en\/"},{"@type":"ListItem","position":2,"name":"Zero trust: a strategic approach to preventing cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/","name":"Ikusi EN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/testing.xplaye.com\/ikusi2\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/f4a3d3d1f4a28dfbfbe2c9f81fb5dc13","name":"xplaye","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29c78ba38d60022df8e9fa10f92ff0243fa9452265375de2d2d8208764592a1b?s=96&d=mm&r=g","caption":"xplaye"},"sameAs":["https:\/\/testing.xplaye.com\/ikusi2"],"url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/author\/xplaye\/"}]}},"_links":{"self":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/10922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/comments?post=10922"}],"version-history":[{"count":2,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/10922\/revisions"}],"predecessor-version":[{"id":10924,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/10922\/revisions\/10924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/media?parent=10922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/categories?post=10922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/tags?post=10922"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/temas?post=10922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}