Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Filter by Custom Post Type
Posts
Pages
Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Filter by Custom Post Type
Posts
Pages
blank
More Posts with same Categories

Absolute Security is out however Zero Trust security is in…

Overview

Is there an app for that…yes of course there is an app for problems that are not even unearthed yet. 

Considering that good data is worth gold…does that app risk compromising your in every facet of your livelihood (IT professionals refer to this as an attack surface)…yes unfortunately it does if you act gung ho.

So not to throw the baby out with the water, apps are great positive appendixes to your life….you should constantly educate yourself on the topic of security and use apps wise.  Every time you use a free (often paid) app or service then it is simply spying on you by trading your personal info for advertising money….this is the rule of economics and is as simple as that. 

Big tech companies became super wealthy by selling your private info and then either adding it into the massive fine print or denying it.  Hackers became powerful by exploiting every good process.   

The current state of IT security, in particular, is that there is now no such thing any longer as absolute security as it was replaced by the term ‘’ which is a radically different approach…

Use cases

A few approaches to best industry practices:

  • Any products & services can contain security risks so properly vetted and from sources, you know. (Notice I did not mention sources you trust as there should be none)
  • Even known sources may be using risky components from their sources.
  • Legacy technologies can pose enormous risks so understand the underlying tech.
  • MFA or multi-factor authentication makes the risk much safer.
  • NFC as found in bank cards is a good way of determining good traceability and authentication in physical devices.
  • Cloud to cloud such as OATH2.0
  • Web 3.0 with blockchain data management.
  • Encrypting data in all  3 states as described below or here in article.

 

How can great security be achieved?

By adopting segmented ZERO TRUST security!  This means layering security like an onion and segmenting networks well.  Add a few other best industry best practices and your data is safe.

CATIM usage

At CATIM we promote and have fully adopted a Zero Trust philosophy in all our solutions using modern tech such as MFA & NFC.

Additional Post information

Related Posts

Focus Page

Recent Page changes

Latest Post

Fast industrial application development
Consulting

CODESYS speeds up application development

Codesys is a software development platform used typically in industrial applications such as PLCs found in traffic lights or CNCs in machinery. Codesys enable devices to conform to industry standards such as IEC-61131-3 while making it easier to develop complex applications.

Read More »

Recent Related Posts