Skip to main content

Almost all software and systems are vulnerable to attack in some form

Image depicting a hand on a scanner
(Image credit: Pixabay)

Arguing that a rise in remote work have left businesses more vulnerable to cybersecurity attacks like ransomware, a new report suggests that deploying a zero trust architecture is expected to double the efficacy of cybersecurity protections against a range of threats.

Conducted by Symmetry Systems, the report surveyed 125 IT and security decision-makers in midsize and large organizations, and found businesses anticipate zero-trust architecture will increase their ability to stop data breaches by 144%. 

Interestingly, the two lowest anticipated increases with zero-trust are preventing ransomware (83% increase) and identifying vulnerabilities that attackers could target (78% increase), though Symmetry System notes that these increases are significant too.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Brain trust

According to the report, most businesses look at zero trust to strengthen cybersecurity protections primarily focused on internal matters, such as identity and access management (IAM) and application access management for employees, and internally-facing applications.

In fact, by limiting an insiders’ scope of access to sensitive corporate data, the respondents expected the efficacy of their protections against insider threats to double.

However, the report also found that businesses don’t look at zero trust as an answer to all threats. 

“On average, there is still a 40% to 50% gap left between the anticipated future state with zero trust and a robust set of complete cybersecurity protections. Respondents expect zero trust to make a significant contribution to reducing the scope of threats (as it should), but do not expect it to completely mitigate every threat alone (as it cannot),” finds the report.

Protect your computers with these best antivirus software, and cleanse them with these best malware removal software

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.