In 2017, a ransomware attack involving malware called WannaCry crippled UK’s NHS. About 200 primary care facilities had to delay or suspend their medical procedures because of inaccessibility of records. Within the same year, Equifax, one of the largest credit bureaus in the United States, experienced a data breach, exposing over 145 million personal and financial records. Organizations are […]
In 2017, a ransomware attack involving malware called WannaCry crippled UK’s NHS. About 200 primary care facilities had to delay or suspend their medical procedures because of inaccessibility of records.
Within the same year, Equifax, one of the largest credit bureaus in the United States, experienced a data breach, exposing over 145 million personal and financial records.
Organizations are well aware of the reality of cyberthreats, but many still don’t understand how they work — often mistakenly believing that these are only external threats. In fact, the story can begin on the inside. Because of this, the concept or model called “zero trust” was born.
Zero trust is built on the idea that “everyone should trust no one.” From an organizational perspective, all members, from the CEO down to rank and file, can commit, influence, aggravate, or promote cyberthreats whether accidentally or deliberately. They can be just as harmful as cyberattackers that destroy systems around the world.
Also read: Hyperconverged Infrastructure is Reshaping IT Management
To further understand the principle behind zero trust is to go back to 2004 when Paul Simmonds introduced two concepts to the Jericho Forum. These two are castle-and-moat model and deperimeterization:
Six years after the introduction of deperimeterization, a Principal Analyst and Vice President of Forrester Research, John Kindervag wrote about zero trust. He implied that:
Also read: Transforming Networks: From Virtualization to Cloudification
Since the inception of zero trust, many companies, including Google, have already expanded their approach to include a variety of systems, platforms, and devices. The reason is simple: they see its value in this highly digital age.
1. Cyberattacks Are Costly
Cybersecurity Ventures broke down the staggering costs of cyberattacks. By 2021, its value could reach a mind-boggling $6 trillion annually. That’s equivalent to almost $200,000 per second!
In fact, the losses are so huge that, when compared to world economies, cybercrimes would have ranked third after the U.S. and China. It also costs more than the global drug trade and natural disasters.
These threats are especially harmful to small businesses. In a 2018 report by Keeper Security, over half of U.S. small businesses with fewer than a thousand employees experienced a cyberattack. Almost 60% claimed that their data had been breached.
These cybercrimes usually cost small enterprises around $200,000 a year. Approximately 60% of these businesses eventually shut down within six months after an attack.
2. The 5G Network has a Lot of Vulnerabilities
The 5G network has been a subject of excitement — and contention and politics — because of what it can do to IT. With its promise to hasten speed and decrease latency, it feels like the sky’s the limit when it comes to running applications and networks.
5G technology can fuel the growth of IoT devices and increase the demand for self-driving cars and smart cities. Small businesses can be just as efficient as their large-scale counterparts as platforms become more capable of offering services that will otherwise be too expensive to acquire and maintain before.
However, this technology can also offer cybercriminals different pathways to infiltrate. 5G’s connectivity may also become its Achilles’ heel. In 2019, the University of Iowa and Purdue University enumerated at least ten 5G vulnerabilities, including hijacking emergency alerts delivered through texts and incoming calls.
Companies can expand zero trust to cover users, machines, and networks. It means that even if a bad actor is successful in bypassing the first layer of protection, it may not achieve its goal to go deeper.
This approach also promotes constant monitoring of internal and external use, so IT teams can become aware of suspicious access or activities.
Also read: The Growing Value of a Microservice Architecture
Zero trust is a smart, realistic, and doable security model, but it is not perfect. Writing for Computer Weekly, Mike Gillespie illustrates the limitations, challenges, and barriers of zero trust.
For others, the volume of applications, people, and data it needs to manage can be a significant challenge. At some point, it may fail to secure one of these properly, providing the entry cybercriminals need to take over.
Microsoft has outlined some recommendations to strengthen and improve zero trust policies within the organization. These include:
Microsoft revealed that over 20% of companies now implement zero trust, while more than half said that they will do so within the next 12 months. Thus, it looks like it’s here to stay.
The zero trust approach will make the cyberworld a safer place. However, for it to truly serve its purpose in the organization, this model needs to evolve to accommodate the changing needs of the users. Companies should also overcome the model’s limitations and never forget about the basics of cybersecurity.
Read next: Understanding the Role of Enterprise Data Fabrics
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.