Zero trust could be the key to defending against ransomware attacks

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock)

Zero-trust architecture is set to increase the efficiency of cybersecurity solutions to stop data breaches by 144%, a new report has claimed.

Surveying 125 IT and security decision-makers from both midsize and large organizations, on their plans surrounding zero-trust architecture, Symmetry Systems found the majority of organizations are well acquainted with the advantages of zero-trust and are rushing to deploy.

For the majority (53%), the main motivator for the deployment of zero-trust architecture is ransomware attacks. However, they are also keen on securing customer data, as well as protecting themselves, and their employees, in these new remote-first and hybrid working-first environments. 

Legacy system limitations

How many will be left behind? Not too many, but still a significant portion, the report suggests. Allegedly, more than 90% of respondents confirmed their organization was planning an enterprise-wide deployment of zero-trust architecture.

Zero-trust allows for the elimination of one point of failure, during a data breach. Even if malicious actors get their hands on login credentials, database locations or IPs, with zero-trust integration that information is useless, as they’re barred from accessing information given to application roles, cloud-network perimeters, or Identity and Access Management (IAM). Speaking of IAM, almost three-quarters (73%) of respondents are focused on IAM for employees, as the key design modification for zero trust. 

Elsewhere in the report, the two companies listed different challenges businesses are facing when deploying zero-trust architecture, with the majority (55%) saying legacy system limitations were their number one barrier. 

"Today's threat environment is drastically different from what we have experienced even in recent years – with relentless cyberattacks, the adoption of cloud services and mass remote or hybrid work," said Michael Sampson, Senior Analyst at Osterman Research, which helped with the report. "Many organizations have begun the transition to a zero-trust architecture and those who have not are behind the curve."

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Dr Chase Cunningham speaking at ZTW25
The grand delusion: endpoint protection isn’t the magic pill, says Dr Zero Trust
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
Security
Protect your network with an AI-secure browser and SASE framework
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)