Adopting a Zero Trust approach to security
Adopting a Zero Trust approach to security with IBM
A security breach can be eye wateringly expensive for an enterprise organisation. In IBM’s Cost of Data Breach Report 2020 which surveyed 524 organisations, interviewed 3,200 knowledgeable individuals who had experienced data breaches in 2019/20, spanning 17 countries and 17 industries, the following statistics were notable.
Stolen or compromised credentials were the most expensive cause of malicious data breaches. One in five companies (19%) that suffered a malicious data breach was infiltrated due to stolen or compromised credentials, increasing the average total cost of a breach for these companies by nearly $1 million to $4.77 million. Overall, malicious attacks registered as the most frequent root cause (52% of breaches in the study), versus human error (23%) or system glitches (25%), at an average total cost of $4.27 million.
As organisations digitise and increasingly turn to a hybrid mix of on-premise and cloud-based technologies to increase agility, remain competitive, and drive their organisations forward, their security requirements become increasingly more complex.
A zero trust approach aims to wrap security around every user, every device, every connection — every time. Unify and integrate your security tools to protect your most valuable assets and proactively manage threats. Get started by aligning zero trust to your business initiatives. Map out your existing investments. Prioritise projects and integrations.