Loading...
It’s getting to be that you can hardly trust anyone anymore. That doesn’t sound like a lot of fun if you’re trying to make some new friends. However, it might just be an effective strategy for your organization when it comes to Information Technology (IT) and cybersecurity.
Adam Rosenzweig, program manager, nonprofit success, at Okta For Good, described the “Zero Trust” approach during a session on IT security best practices (#19ntcITsecurity) at the annual Nonprofit Technology Conference (#19NTC), held earlier this year at the Oregon Convention Center in Portland, Ore.
Organizations used to protect themselves by creating a perimeter around their network. Everyone inside the network was a trusted entity while everyone outside the network was not. The problem was that if a hacker managed to breach the network they then had access to everything — all the way up to your most sensitive data, Rosenzweig said.
With cloud computing becoming more prevalent in the past few years, sensitive data now has moved outside of that perimeter as mobile and cloud computing have essentially dissolved the perimeter. The result is that you can no longer automatically trust anyone. Today, a perimeter is needed around everyone who has access to data in an organization. That way, people earn trust through context.
Okta for Good is a corporate social impact initiative of Okta, a provider of identity and access management for nonprofits. Through TechSoup, eligible nonprofits can get 25 free licenses to the Okta Identity Cloud.
As we celebrate our 36th year, NPT remains dedicated to supplying breaking news, in-depth reporting, and special issue coverage to help nonprofit executives run their organizations more effectively.