WHY ORGANISATIONS CAN NO LONGER IGNORE ZERO TRUST
Security Advisor Middle East|March 2020
WHY ORGANISATIONS CAN NO LONGER IGNORE ZERO TRUST
WEAK PASSWORDS ARE A MAJOR SOURCE OF BREACHES AND BY ADOPTING A ZERO TRUST APPROACH WITH LEAST PRIVILEGED ACCESS, ORGANISATIONS CAN INCREASE THEIR COMPLIANCE LEVELS, EXPLAINS KAMEL HEUS, REGIONAL DIRECTOR, NORTHERN, SOUTHERN EUROPE, MIDDLE EAST AND AFRICA FROM CENTRIFY.

The recent Gartner Security and Risk Management Summit held in Dubai, UAE revealed that the Middle East and North Africa region has the highest number of reported breaches in the world. In 2018, more than 36,000 incidents were reported from this region, the highest in the world. Along with this statistic, Gartner presentations revealed that the region also has the highest mean time to identify the breach. At 260 days, it is the highest in the world.

What are the weaknesses in organisations that allow such a high number of incidents? Post-incident analysis usually reveals that prevalence and usage of weak passwords amongst end-users, and especially privileged end users like administrators, is the root cause for such breaches. Most incidents that happen are not necessarily of an advanced nature, and mostly stem when threat actors or hackers are able to crack weak passwords, and gain entry into an organisation’s network using compromised credentials of end-users and administrators.

articleRead

You can read up to 3 premium stories before you subscribe to Magzter GOLD

Log in, if you are already a subscriber

GoldLogo

Get unlimited access to thousands of curated premium stories, newspapers and 5,000+ magazines

READ THE ENTIRE ISSUE

March 2020