{"id":5476,"date":"2024-12-16T15:02:37","date_gmt":"2024-12-16T20:02:37","guid":{"rendered":"https:\/\/www.ncultheaffiliate.com\/?p=5476"},"modified":"2024-12-18T14:11:36","modified_gmt":"2024-12-18T19:11:36","slug":"cyber-security-tip-what-is-this-zero-trust-thing-and-why-it-is-becoming-the-model-of-choice","status":"publish","type":"post","link":"https:\/\/www.ncultheaffiliate.com\/?p=5476","title":{"rendered":"Cyber Security Tip: What is this \u201cZero Trust Thing?\u201d \u2026 and why it is becoming the Model of Choice"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;2px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Zero trust is a relatively new cyber security strategy that is rapidly becoming the security model of choice for businesses. In fact, we anticipate this to be the new standard to meet data protection compliance for all organizations, large and small.<\/p>\n<p>Essentially the only application and logins allowed are those preapproved by you, and everything else is treated with zero trust, locking down your network. Here\u2019s an example of how it works\u2026<\/p>\n<p>Imagine you own a shopping mall and want to protect it from a shooting, shoplifters or other bad people. You place cameras and guards by every door to monitor people coming in and out. Maybe you even have a metal detector.<\/p>\n<p>The problem is, the doors are wide open, and you are relying on the people running security to spot a bad guy, which means there\u2019s room for error. How do you spot a shoplifter or mugger? They don\u2019t wear a sign that says, \u201cI\u2019m a shoplifter!\u201d as they enter the mall.<\/p>\n<p>A zero-trust environment ONLY lets the people into the mall who you know personally. You essentially have \u201czero trust\u201d for anyone who wasn\u2019t invited in, and you block them ALL except for those specific people (applications) you know and trust.<\/p>\n<p>On a computer network, that means applications like Office or QuickBooks are allowed, but NOT something that is new or unvetted.<\/p>\n<p>Have questions about cyber security or some other IT-related issues? <a href=\"https:\/\/go.appointmentcore.com\/book\/multiservice\/jXIzwK8\" target=\"_blank\" rel=\"noopener\">Access our calendar here<\/a> to book a quick, 10-minute call.<\/p>\n<p><strong><img loading=\"lazy\" class=\"wp-image-5478  alignleft\" src=\"http:\/\/www.ncultheaffiliate.com\/wp-content\/uploads\/2024\/12\/eric.jpg\" alt=\"\" width=\"117\" height=\"126\" \/>Eric Burns<\/strong><br \/>Director of Business Development<br \/>12 Points Technologies<br \/><a href=\"mailto:eric@12pointsinc.com\">eric@12pointsinc.com<\/a><br \/>(402) 401-6806 &#8211; Work<br \/><a href=\"http:\/\/www.12pointsinc.com\">www.12pointsinc.com<\/a><\/p>\n<p>12 Points Technologies has launched a brand-new e-mail series called \u201cWeekly Cyber Security Tip\u201d They are offering to credit unions at no cost. If you would like to be added to the email list, please contact Eric Burns at <a href=\"mailto:eric@12pointsinc.com\">eric@12pointsinc.com<\/a>.<\/p>\n<p>Each tip will take less than 30 seconds to read but provides credit unions with critical information to avoid falling victim to online scams or ransom attacks, or making other online mistakes that can cost you. The Cyber Tips are pure content (no ads).<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n  ","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;2px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;] Zero trust is a relatively new cyber security strategy that is rapidly becoming the security model of choice for businesses. In fact, we anticipate this to be the new standard to meet data protection compliance for all organizations, large and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=\/wp\/v2\/posts\/5476"}],"collection":[{"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5476"}],"version-history":[{"count":0,"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=\/wp\/v2\/posts\/5476\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ncultheaffiliate.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}