Prevent Internal Threats with Timus Zero Trust

Prevent Internal Threats with Timus Zero Trust

By Greg Tavarez

Credential theft is on the rise as bad actors in cyberattacks turn to complex social engineering attack methods. Cases of credential theft account for almost 20% of all insider incidents, according to the 2022 "Cost of Insider Threats" report by the Ponemon Institute.

Internal threats include not only malicious activity, but also negligent and compromised users, who put business networks and data at risk. The phishing attack that comes to mind for most is the Uber incident, where the attacker managed to bypass MFA to compromise Uber’s network. That is a heart-stopping incident no business wants to experience.

Enterprises that experience a successful phishing attack face the possible worst-case scenario where attackers break into a network with stolen credentials, steal and encrypt corporate data, disrupt operations and ask for a ransom to unencrypt the data, according to Channel Sales Manager for Timus Chris Perry.

This highlights the importance of a zero-trust approach where every user and device accessing the network must be constantly monitored and analyzed. Traditional VPN technology usually struggles to meet the needs of modern network environments. Zero trust provides a solution that verifies users and devices before and after they access the network, protecting against external and internal threats.

Timus ZTNA creates prevents application discovery on the public internet to reduce the attack surface and protect organizations from application exposure to the outside world. The AI-supported SaaS platform is designed to immunize modern workplace against threats. Timus also provides advanced secure remote access to employees wherever they are, whichever device they use.

"These numbers illustrate that criminal insiders and stolen credentials are critical insider threats for organizations," said Perry. "This is where zero trust architecture, recently endorsed by U.S. President Joe Biden for all federal agencies, comes into play."

Remote work and cloud technologies are a part of everyone’s lives in the modern workforce.  Zero trust access is the key to effective protection against cyber threats.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor

SHARE THIS ARTICLE
Related Articles

Produce8 App Update: Slash Unproductive Meetings, Boost MSP Efficiency

By: Greg Tavarez    4/25/2024

Produce8 launched a major update to its flagship application designed to provide MSPs and their clients with unmatched insights into how meetings affe…

Read More

MSP Expo Gold Sponsor ThreatLocker Strengthens Zero Trust Focus with $115M Series D Funding

By: Greg Tavarez    4/25/2024

ThreatLocker's recent announcement of a $115 million Series D funding round only highlights further the increasing demand for better endpoint protecti…

Read More

BreachRx Secures $6.5M Seed Funding

By: Stefania Viscusi    4/24/2024

BreachRx closed a $6.5 million seed round, led by SYN Ventures, with additional support from Overline.

Read More

Bigleaf Networks and NHC Partner to Optimize the Edge

By: Greg Tavarez    4/24/2024

New Horizon Communications Corp. (NHC) entered a strategic collaboration with Bigleaf Networks to offer network communications services to organizatio…

Read More

Secure the Everywhere Work Landscape: Ivanti Launches EASM and Platform Upgrades

By: Greg Tavarez    4/24/2024

The recently released Ivanti Neurons for External Attack Surface management, or EASM, helps combat attack surface expansion with full visibility of ex…

Read More