Zero Trust Approach to Cyber Attack Prevention

 


Akamai, a provider of digital experience protection and provisioning solutions, recommends the Zero Trust approach to cyberattack prevention.

According to Akamai, this step is important because digital transformation is one of the main pillars of Indonesia's economic growth, as a result companies must ensure that their data and customers are protected from cyber attacks.


Zero Trust is a network security model that uses the 'least privilege' principle based on a strict identity verification process. This system ensures that only authorized users and devices can access applications and data.



"The framework used ensures that only authenticated authorized users and devices can access applications and data. At the same time, it protects applications and users from various sophisticated online attacks," Sidharth Pisharoti, Regional Vice President, Akamai Technologies - India, South East Asia and APJ Carrier, in a statement received by us.


Amid the COVID-19 pandemic, cybersecurity incidents are on the rise worldwide. Cybercriminals are constantly looking for new opportunities to breach corporate data through increasingly sophisticated attacks.


Akamai analyzes over 300 TB of new attack data every day. Through this analysis, Akamai has recorded a number of record-breaking attack vectors such as:


Distributed-Denial-of-Service (DDoS) Attacks:Akamai mitigated 1900+ DDos attacks in Q1 2021, marking a 34% increase year-on-year.

Credential abuse: 63 billion attacks of credential abuse were identified in Q1 2021, a sharp increase of 133% year-on-year.

Application layer attacks: Over 2 billion Web Access Firewall (WAF) alerts triggered in Q1 2021, a 70% year-on-year jump.

"The figures above show that organizations/enterprises must move away from traditional perimeter defense strategies and start protecting their internal applications just as they protect external applications," concluded Pisharoti.

Previous Post Next Post

Contact Form