Channel Eye
  • Channel Eye Careers
  • Channel Eye Careers
  • Channel Eye Carers
  • Channel Eye Careers
  • Channel Eye Careers
  • Business
    • Appointments
    • Data Protection
    • Digital & Technology
    • Environment
    • Features
    • Financial Services
    • Interviews & Profiles
    • Leadership
    • Legal & Professional Services
    • People
    • Property
    • Retail & Hospitality
    • Transport
    • Wellbeing at Work
  • Careers
  • Events
    • Events in Jersey
    • Events in Guernsey
    • Events in Isle of Man
    • Events in Alderney & Sark
    • Virtual events
    • All events
    • Past Events
  • Lifestyle
    • Arts & Culture
    • Charity & Community
    • Education
    • Food & Drink
    • Health & Wellbeing
    • Home
    • Leisure
    • Travel
  • Location
    • Jersey
    • Guernsey
    • Isle of Man
    • Alderney & Sark
  • Advertise
  • Subscribe
No Result
View All Result
Channel Eye
No Result
View All Result
  • Channel Eye Carers
  • Channel Eye Careers
  • Channel Eye Carers
  • Channel Eye Careers
Home Business Digital & Technology

Feature: A new security approach for the new world of work

When zero trust is the best trust

December 3, 2020
in Business, Digital & Technology, Features, Guernsey, Isle of Man, Jersey
Office building at night
Share on LinkedInTwitterFacebookEmail

With the spread of Covid-19 throughout the world, millions of people have moved to remote work. Whilst not everybody has enjoyed working from home, a large percentage of people have seen the benefits of doing so.

The way we work has now changed forever. Many businesses have realised that they don’t require their entire workforce to be office based and that flexible, remote working can drive and accelerate productivity.

Enabling a team to work remotely however is an ongoing challenge that looks different for every organisation, depending on their size, industry, and stage of digital transformation. Every business needs to define their own priorities to enable remote productivity across their organisation’s workforce.

To accommodate this change in the new world of work, organisations need to rethink their security model. They require a security model that effectively adapts to the complexity of the modern environment and embraces the mobile workforce which has now become the normal for many businesses and will continue to be post pandemic.  It must protect people, devices, applications, and data wherever they are located.

Start with Zero Trust

Never trust, always verify

It is important to start your new security model with ‘zero trust’, based on the principle of never trust, always verify.

Each access request should be treated as though it originated from an uncontrolled network.  Every access request should be strongly authenticated, authorised within policy constraints, and inspected for anomalies before access is granted.  Everything from the user’s identity to the application’s hosting environment is used to verify the request and prevent breach.

Transitioning to Zero Trust is a multi-layered journey that can take time to achieve a high level of maturity.  Many security vendors however have designed frameworks to assist your business on this journey and are aligned to maturity models to track your progress.  Most follow very similar principles and are based on several foundational pillars that assist in protecting your business end-to-end, covering: Identity, Endpoints, Data, Apps, Infrastructure and Network. Each of these pillars are critical elements that need to be protected.

Microsoft’s Zero Trust Framework
Microsoft’s Zero Trust Framework

Managing Identity

The current pandemic has seen an explosion of cloud application adoption and the mobile workforce which has significantly redefined the security perimeter.  Data is being accessed outside the corporate network, so it is no longer feasible to rely on traditional network controls. These controls need to move to where the data is: on devices and inside apps.

A strong identity foundation makes it possible for users to securely access the resources and apps they need, from wherever they are.

But first, what is an identity?

An identity can represent a person, a user, it can be a service or an Internet of things (IOT) device.  Manging identities is one of the most powerful ways to control access to data.

In a Zero Trust security model, before an identity attempts to access a resource, organisations need to:

  • Verify the identity with strong authentication
  • Ensure access is compliant and typical for that identity
  • Follow least privilege access principles
What does ‘least privilege access principle’ mean?  The principle means giving a user (or a process) only the access which is essential to perform their function. For example, a user who usually does work entering financial transactions, does not need to be able to install software or create new user accounts.  Limiting access in this way reduces the risk of malevolent actions, whether intended or not.

Using tools such as Microsoft’s Azure Active Directory can provide a single identity management platform, allowing you to easily enable Multi-Factor Authentication (MFA).  MFA safeguards users credentials and gives you that additional layer of protection and with biometric technologies almost becoming standard on the devices we use today.

Conditional Access enables organisations to create risk-based policies applied to user, device or location to determine whether access to apps or data should be allowed, limited, or blocked. Providing users with a Single-Sign On (SSO) experience encourages tougher security measures as users don’t have to have different passwords to access all of the different apps they need whether they are using SaaS or on-premise apps.

Managing Devices

Unmanaged devices are a very attractive and powerful entry point for malicious parties, and it’s vital that only authorised and healthy devices can access applications and data. With more employees working from home and across devices, organisations need a strategy to support bring-your-own-device (BYOD) scenarios.

There are a few key rules for securing devices and endpoints in a Zero Trust model:

  • Zero Trust security policies are centrally enforced through the cloud and cover endpoint security, device configuration, app protection, device compliance, and risk posture.
  • The platform as well as the apps that run on the devices are securely provisioned, properly configured, and kept up to date.
  • There is automated and prompt response to contain access to corporate data within the apps in case of a security compromise.
  • The access control system ensures that all policy controls are in effect before the data is accessed

As mentioned above, Conditional Access plays a big role in protecting your organisation from the threat posed by unauthorised devices. Using risk-based policies, devices that don’t meet the required conditions are denied access.

Many tools exist to manage these external devices and ensure that enrolled devices have the right policies applied, for example that the device is encrypted with strong passwords and anti-virus is up to date etc.

 

As your organisation embraces the new world of work, it is important to rethink your security requirements, protecting your people, devices, applications and data no matter where they are located. A Zero Trust security model will enable you to manage your user’s identity and devices, protecting your critical elements and driving and accelerating productivity.


James-SolomonAuthor: James Solomon, Partner Alliance Manager, C5 Alliance

ShareTweetShareSend

Channel Eye Team

Related Stories

Logicalis report reveals CIOs under pressure to deliver a return on innovation
Digital & Technology

Logicalis report reveals CIOs under pressure to deliver a return on innovation

March 21, 2025
C5 Alliance joins Dolphin Discovery Trail 2025 to support local charitied
Charity & Community

C5 Alliance joins Dolphin Discovery Trail 2025 to support local charitied

March 14, 2025
Cyber security hacking
Digital & Technology

Strengthening defences against evolving threats from the Southeast Asia region

March 10, 2025
Next Post
Katie Bellingham

Focusing on HR training success

Channel Eye subscribe
  • Channel Eye Careers
  • List your event
  • Channel Eye Careers
  • Channel Eye Careers
  • Channel Eye
  • Channel Eye Careers
  • List your event

Be the first to know​

Subscribe to the essential islands business news, direct to your inbox every morning​
  • Business
  • Careers
  • Events
  • Lifestyle
  • Subscribe
  • Advertise
  • Directory
  • Privacy Policy
  • Contact

©2025 Channel Eye Limited.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Business
    • Appointments
    • Data Protection
    • Digital & Technology
    • Environment
    • Features
    • Financial Services
    • Interviews & Profiles
    • Leadership
    • Legal & Professional Services
    • People
    • Property
    • Retail & Hospitality
    • Transport
    • Wellbeing at Work
  • Careers
  • Events
    • Events in Jersey
    • Events in Guernsey
    • Events in Isle of Man
    • Events in Alderney & Sark
    • Virtual events
    • All Events
    • Past Events
  • Lifestyle
    • Arts & Culture
    • Charity & Community
    • Education
    • Food & Drink
    • Health & Wellbeing
    • Home
    • Leisure
    • Travel
  • Location
    • Jersey
    • Guernsey
    • Isle of Man
    • Alderney & Sark
  • Advertise
  • Subscribe
  • Contact

©2025 Channel Eye Limited.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.