DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

Related

  • Zero Trust for AWS NLBs: Why It Matters and How to Do It
  • More Efficient Software Development Means More Need for Devs
  • Real-Time Fraud Detection Using AI and Machine Learning
  • How Explainable AI Is Building Trust in Everyday Products

Trending

  • Power BI Embedded Analytics — Part 2: Power BI Embedded Overview
  • *You* Can Shape Trend Reports: Join DZone's Software Supply Chain Security Research
  • Scalable, Resilient Data Orchestration: The Power of Intelligent Systems
  • Accelerating AI Inference With TensorRT
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. How Zero Trust Improves Ransomware Response

How Zero Trust Improves Ransomware Response

Zero trust is often discussed as a critical solution to cybersecurity problems. Here's how it can help with the rising threat of ransomware.

By 
Zac Amos user avatar
Zac Amos
·
Oct. 07, 22 · Opinion
Likes (1)
Comment
Save
Tweet
Share
6.5K Views

Join the DZone community and get the full member experience.

Join For Free

There is an increased demand for cybersecurity analysts due to cybercriminal activity rising. Zero trust is the prime cybersecurity framework that analyzes and authenticates all users on a network. The same validation protocol runs regardless of whether you are inside or outside an organization.

Ransomware attacks could affect everyone — businesses and individuals alike — so anyone working with sensitive data must implement systems like zero trust for sufficient protection. How does this benefit responses to ransomware attacks?

1. Helps Mitigate Human Error

Human error accounts for over 95% of cybersecurity issues. With the remote work trend since the start of the pandemic, zero trust could assist in curbing the increased threat potential from a lack of unified network management. Monitoring employee activity on work machines is challenging as mobile workforces become the norm.

With these desktops and cloud services containing sensitive information connected to potentially insecure Wi-Fi connections, it doesn’t matter if they have a VPN or if the business has a remote desktop protocol. Cybercriminals have already developed specific strategies to tackle VPNs and RDPs.

Zero trust architecture provides a more comprehensive safety blanket. It can protect machines no matter their location, minimizing the chance of human error causing ransomware attacks.

2. Limits Attacker Access

Zero trust forces applications to connect to users with application control instead of users linking to applications — the programs potentially vulnerable to exploitation. With zero trust systems in place, it not only investigates every user but also only provides them with specific permissions to the applications.

Even if hackers steal an employee’s identity, that employee will already have assigned permissions — meaning the hacker is not sure to obtain every piece of information they need. It could even tell if a worker is attempting to access resources outside their regular working hours, creating red flags for security infrastructure to take action.

If hackers only have access to limited resources, to begin with, then walls will be harder to tear down. In the meantime, other security measures could start to fight the threat.

3. Adapts to Custom Threats

Cybercriminals adapt faster than many can comprehend. Because zero trust requires hackers to obtain access, technologies can quarantine files before they have a chance to execute.

The infrastructure for zero trust matures over time, eventually until it can deploy advanced protections based on continual observation of the digital landscape and user patterns. Zero trust buys analysts time to get a broader scope of unique threats, allowing the defense to adapt as quickly as the offense.

4. Decreases Exfiltration

Even if the hackers make their way into the network, zero trust helps prevent data from leaving. This mitigates the increase in double extortion ransomware attacks, where attacks attempt to take out data while encrypting it to provide extra leverage when asking for payment. The individuals have to pay for the decryption key and the data.

Informing employees how to back up their data securely is essential to minimizing compromised information during a ransomware attack — especially if companies continue regular cybersecurity training. This way, exfiltration is less of a concern, and workers can use their energy to address the security issue.

5. Saves Money

This may not seem directly related to the ransomware response, however, freeing up funds would help any company have the opportunity to invest more in their cybersecurity. Organizations with zero trust infrastructure pay around $1.76 million less for a data breach than if they didn’t have it in place. Without zero trust, more resources and labor go into combatting the threat.

Even if a business chooses to pay a ransom, it’s never sure it will obtain lost data. Instead of wasting company funds paying ransoms on a gamble, invest that money in trained analysts and proper hardware and software to maintain security for all staff.

This directly affects ransomware response as zero trust not only diversifies protection methods on top of firewalls. For example, it saves money on mental exertion from emergency response protocols and inadequately trained staff. 

Zero Trust Helps Ransomware Response

Though zero trust does not provide a foolproof method to stop all types of ransomware attacks, it’s an essential tool to implement for stable security infrastructure. With its adaptability and individualized attention to users, it is the safety blanket to best supplement any ransomware prevention plan.

Trust (business)

Opinions expressed by DZone contributors are their own.

Related

  • Zero Trust for AWS NLBs: Why It Matters and How to Do It
  • More Efficient Software Development Means More Need for Devs
  • Real-Time Fraud Detection Using AI and Machine Learning
  • How Explainable AI Is Building Trust in Everyday Products

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!