‘Zero trust’ was supposed to revolutionize cybersecurity. Here’s why that hasn’t happened yet.
- June 29, 2023
- Posted by: Dan Corcoran
- Category: Cybersecurity, Remote Work, Security, SMB, Zero Trust Network Access (ZTNA)
Despite more than a decade of talk, the seminal concept in cybersecurity of zero trust — the assumption that no user or device on a computer network can be trusted — hasn’t been implemented nearly as widely as one might expect from all of the attention.
Why business email compromise still tops ransomware for total losses
- September 9, 2022
- Posted by: Ken Stilwell
- Category: Business Email Compromise, Criminal Gangs, Cybersecurity, Hacktivists, Phishing, Remote Work, Security
While businesses are busy trying to protect themselves against ransomware attacks that spark headlines news, threat actors are sticking to one of the oldest and most effective hacking techniques—business email compromise (BEC).
By giving packets verifiable identity, precisely controlling packet usage and significantly collapsing the threat surface, TrustWrx enables the MSP to provide corporate-class Zero Trust security to the small and medium size business.