CONTACT
Looking to get in touch with the team? Use the form below and we will get back in touch as soon as possible.

Zero Trust

As far as security models are concerned, one that sticks out as a good safeguard from the threat of being compromised is the ‘zero trust’ approach.

‘Zero trust’ mandates that we deny all access rights to our personal information and data until a requester proves they legitimately require it.

This often goes against the grain of our polite natures, as demonstrated by the number of times someone has held open a security door to save me the bother of re-swiping. So helpful. So lacking in security awareness.

Internet and phone scams prey on this need to please and actively manipulate our trust. Whether the scammer assumes the identity of a trusted brand, an authority figure or the provider of good fortune, exerting a ‘zero trust’ approach can stop them in their tracks.

If you are contacted out of the blue by someone you don’t know requesting personal data from you, challenge them to prove your trust is warranted. Ask questions that will qualify their legitimacy. Organisations such as banks and government departments train staff around the value of data privacy, so they will not be offended when asked to demonstrate their legitimacy.

If directly contacted by such organisations, it’s safer to take control of the interaction by ending it. Go to their website, find a contact number and re-engage that way. Never use a number or link a caller supplies, as this demonstrates a misguided assumption they deserve your trust.

One may argue this is a somewhat bleak view of the world, but I beg to differ. You are simply protecting your information. It’s not theirs, it’s yours and as such, they need to prove they deserve access to it. Until they are able to earn your trust, it’s safer to assume they’re a potential threat. Trust is earned not given.

By NSP Marketing | 04 September 2019
By NSP Marketing | 04 September 2019

Let’s stay in touch!

Enter your details below to stay up-to-date with the latest IT solutions and security measures.

Quick Support Access