Almost all software and systems are vulnerable to attack in some form

Many businesses believe limiting insider access will double efficacy of protections

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Arguing that a rise inremote workhave left businesses more vulnerable tocybersecurityattacks likeransomware, a new report suggests that deploying azero trust architectureis expected to double the efficacy of cybersecurity protections against a range of threats.

Conducted by Symmetry Systems, the report surveyed 125 IT and security decision-makers in midsize and large organizations, and found businesses anticipate zero-trust architecture will increase their ability to stopdata breachesby 144%.

Interestingly, the two lowest anticipated increases with zero-trust are preventing ransomware (83% increase) and identifying vulnerabilities that attackers could target (78% increase), though Symmetry System notes that these increases are significant too.

We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.

Click here to start the survey in a new window«

Brain trust

Brain trust

According to the report, most businesses look at zero trust to strengthen cybersecurity protections primarily focused on internal matters, such as identity and access management (IAM) and application access management for employees, and internally-facing applications.

In fact, by limiting an insiders’ scope of access to sensitive corporate data, the respondents expected the efficacy of their protections againstinsider threatsto double.

However, the report also found that businesses don’t look at zero trust as an answer to all threats.

“On average, there is still a 40% to 50% gap left between the anticipated future state with zero trust and a robust set of complete cybersecurity protections. Respondents expect zero trust to make a significant contribution to reducing the scope of threats (as it should), but do not expect it to completely mitigate every threat alone (as it cannot),”findsthe report.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Protect your computers with thesebest antivirus software, and cleanse them with thesebest malware removal software

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

Smeg Combi Steam Oven review: a multi-functional countertop oven that looks stunning and cooks well