• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

The 5 Misconceptions You Probably Have About a Zero Trust Approach

We bet you've probably fell victim to one of these misconceptions about implementing a zero trust approach. That's ok, we're here to help.

October 21, 2020 Adam Forziati Leave a Comment

implementing, zero trust approach, zero trust misconceptions

Zero Trust has gained significant momentum this year with the surge in pandemic-induced remote work, taking a fast track from security option to business priority.

In fact, recent research from Microsoft shows 51% of business leaders are speeding up their deployment of Zero Trust capabilities.

But what does Zero Trust really mean in practice and what are common misunderstandings about it? Is it even feasible for small and midmarket organizations today?

Alexandre Cagnoni, director of authentication at network security company WatchGuard Technologies, says SMBs often fear the complexity of the approach, fearing they don’t have the resources to implement it.

“But this is not true!” he says. “Anyone can use this approach, it’s a methodology, not a certification. Unless you’re completely not connected to the internet, your organization could probably benefit from it.”

Related: 3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

This is especially true in 2020. In the beginning of the pandemic, the biggest concern was providing access to applications via a VPN. Now, Cagnoni sees many companies focusing on protecting their GSuite or email apps for fear of hackers getting access to the very way we change passwords.

Since people are using their networks more, all it takes to attack a whole network of users is for one user to fall for a Trojan or social engineering ploy.

A quick reference for how to implement a zero trust approach:

  1. Identify the protect surface
  2. Map the transaction flows
  3. Build a Zero Trust architecture
  4. Create Zero Trust policy
  5. Monitor and maintain

Common zero trust misconceptions

“I’m inside the network, so my trust is 100%, no need to have security measures.”

“This is one of the reasons they created zero trust: most companies think their firewalls will protect them, but we’ve seen that once someone receives access from a single computer, they can navigate throughout the network,” Cagnoni says.

Hackers aren’t targeting a single person’s information, they’re looking for the information from the entire admin network.

“I need to move all my services to the cloud, and eliminate the local network and the need for remote access or VPN.”

According to Cagnoni, most of the time, you still have some information on shared file servers that can only be accessed via a VPN.

“It’s going to be rare to go completely without a VPN. You’ll still need to ensure the right users are accessing the network.”

“Implementing a strong authentication method for my users is enough to mitigate the risk.”

When you talk about a zero trust approach, you hear a lot about authenticating users and devices. It’s a very important pillar of deployment. But it’s not everything.

You have to guarantee that the computer is not compromised, especially if it belongs to a remote employee.

“WFH is fine because my employees aren’t in a public place like a café.”

Companies thinking about Zero Trust need to reject this notion completely. Making sure a home network is secure is more complicated than it sounds.

You cannot guarantee that WFH employees are working in a secure environment. Consider the home a public place and build trust over time based on the user habits over time.

“I’m moving to cloud services — auto-logins are fine.”

Some cloud apps have users authenticate via a social media account. That might be great from a user standpoint, but it presents threats to cyber security.

Delegating credential management to the user is a mistake. They’re going to share passwords for something like Netflix — the same password, in many cases, they’ve used for their Facebook or Twitter logins.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.