• Linkedin
JOS SG
  • Home
  • Solutions

      Consultancy, Deployment & Migration

      • Everything-as-a-Services
      • Enterprise Security Services
      • Enterprise Application Services
      • SharePoint Services
      • Business & Robotic Process Automation
      • VAPT Security Consultancy

      IT-as-a-Service

      • Hardware Maintenance Service
      • System Maintenance Services
      • Managed Services

      Digital Transformation

      • Empower your Future Workforce
      • Future Workplace
      • Transform with IT
      • Window Virtual Desktop
      • Retail IT Transformation
  • Resources
  • Contact Us
Drive business agility with JOS cloud-based-workplace
June 27, 2022
Grow your Business with JOS IT-as-a-Service
September 8, 2022

Zero-trust, for greater peace of mind

By Jayden Soh, Head of Solutions, JOS Singapore

With the ever-changing geopolitical landscape, increasing ransomware attacks and cybersecurity threats, organisations need to implement a “zero-trust” framework within the company. We do this at JOS, and I recommend others to do the same.

Yes, “zero-trust” is a counterintuitive term, especially when mutual trust and open communication should be at the heart of every organisation. For context, the last two years have shown that cloud-based collaboration platforms are crucial to connect teams across the globe. With hybrid or remote working taking full steam, businesses have had to place increased emphasis on agility and flexibility. This ultimately also ushers in an era of zero-trust in organisations.

So, what is zero-trust?

This model is less about interpersonal relationships and working culture, and more about a security framework.

With workplace modernisation leading to workers increasingly working from practically anywhere, the opportunity for cybersecurity breaches has widen. The traditional investment in perimeter defense of company premises is no longer sufficient. The possibilities of cybersecurity breaches are higher if a company adopts the BYOD policy, giving workers direct access to SaaS application that contains confidential information like customers’ data. 61 percent of malware directed at organisations targeted remote employees. Since the onset of the pandemic, about 30% of organisations have reported a spike in cyber-attack attempts.

Zero-trust requires all users with access to a business’ data to be authenticated and continuously validated for authorisation. It assumes there is no traditional network edge – resources, like workers, can be anywhere. Businesses desperately need to adopt such an approach in the digital world.

Cybersecurity – a hot-button topic and a pressing need

Traditional cybersecurity solutions were not designed to handle today’s fast pace of cyberthreats. Antivirus and traditional security solutions are insufficient measures in combating advanced threats which are becoming increasingly challenging for IT personnel to foresee. Businesses need to keep in mind that traditional endpoint security methods that focus on virus signatures are no longer sufficient to ensure their endpoint security. With cyber threats increasingly becoming more sophisticated and rapid, businesses must adopt a proactive instead of reactive stance so that they can respond and prevent incoming attacks from reaching vulnerable endpoints.

There are many types of endpoint vulnerabilities. For example, any device used by employees (such as laptops, desktop computers, tablets, and mobile phones) is considered a potential cyber-attack target. This threat is further scaled up by the number of applications on each device, and whether each application complies with company security policies. Another example would be legacy cybersecurity solutions from an on-premises world, bounded by a manageable network perimeter, that cannot keep up with ever-changing cyber threats.

Taking another look at how to protect your business

Firstly, businesses need to be aware of existing security vulnerabilities. To do so, they need to implement continuous security monitoring through a centralised management system for an extended detection and response and continuous verification.

A centralised security management system actively searches for vulnerabilities 24/7 and easily integrates and orchestrates the mitigation of cyber threats.

Continuous verification means that no asset, credential, or device is trusted at any time. Businesses need to define its controls to restrict or provide access to corporate information based on device, location, level of suspicious behaviour, amongst other variables.

An end-to-end application would incorporate all of the above to cut threats off at the device level before they spread to the entire business network.

Bridging the distance between the security you have and the protection you need

With day-to-day work being pushed into the cloud and digital space, it makes sense for security perimeters to do the same. Bridging the distance between the security technology you have and the security protection you actually need is a critical business differentiator.

Data breach costs rose from USD3.86 million to USD4.24 million on average per breach and the predicted liability for cyber-physical systems would total over USD$50 billion by 2023. However, in a survey of over 500 organisations worldwide, only 35% of respondents had fully or partially deployed a zero-trust approach.

We need to drive home the point that zero-trust deployment and proper security design at every corner of your network is an investment worth making. We live in a new normal, where threat prevention, detection and response are our everyday, be it via in-house security teams or through engaging strategic enterprise security partners. Only this way, can organisations ensure that their data is well protected and minimise potential business impact in the long run.

Let’s find that balance between organisational security and usability by adopting a zero-trust model, to protect our people, our business and community.

If you would like to learn more on how to safeguard your people and business, please contact us.

Like this article? Follow us on LinkedIn to receive the latest updates from us!

RELATED POSTS

Enjoy IT capabilities at full speed

Read More »
September 20, 2022

Workstation-Driven Productivity

Read More »
August 1, 2021

SASE: Balance Access and Security eBook

Read More »
June 21, 2022
Share
0

Blog Categories

Enjoy Peace of Mind with JOS IT-as-a-Ser

https://www.jos.com.sg/wp-content/uploads/2022/06/JOS-ITaaS-1.mp4

Recent Post

  • The Cutting-edge Technology Behind Digital Business Era January 19, 2023
  • Enjoy IT capabilities at full speed September 20, 2022
  • Grow your Business with JOS IT-as-a-Service September 8, 2022
  • Bridging the distance between the security you have and the protection you need September 1, 2022
  • Drive business agility with JOS cloud-based-workplace June 27, 2022

Company

  • About Us
  • Contact Us
  • Email Subscription
  • Careers

Solutions

  • Cloud
  • Enterprise Security
  • Enterprise Applications
  • SharePoint Services
  • Automation Services

IT-as-a-Service

  • About ITaaS
  • Hardware Maintenance
  • System Maintenance
  • Managed Services

Resources

  • Brochures
  • Infographic
  • Videos
  • Articles
  • Security Advisory

JOS (SG) Pte. Ltd.

67 Ubi Avenue 1, #05-01
StarHub Green, South Wing, Singapore 408942

Copyright © 2023 JOS (SG) Pte. Ltd. All rights reserved.

 Privacy Policy | Terms & Conditions

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of all the cookies. However, you may visit your cookie settings to provide a controlled consent.
Read MoreAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT