A Zero Trustat scale approach to cybersecurity is critical to help local, state, and federal governments keep up with the evolving threat landscape they face. With the increased download of niche apps by workers at all levels of government, those threats can have severe and unexpected impacts. A current example is the popular social media platform TikTok, which has nowbeen banned on federal government-owned work devices, with more than two dozen states enacting similar bans. Plus, many colleges and universities have begun blocking access to TikTok on their campus Wi-Fi networks.
According to the 2022 Data Breach Investigations Report by Verizon, 82% of breaches involved the "human element" either via the use of stolen credentials, phishing scams, or errors and misuse of resources.
We also know that vulnerabilities and their exploitation continue to be the root causes of most information security breaches. Vulnerabilities unattended and unaddressed for months or years are most common. But these could easily be stopped by keeping devices updated with software patches and automatically updating their operating software.
That's why the capability to validate device health is so critical for government IT today and should be the gatekeeper when it comes to allowing or denying access. With Zero Trust, you gain better visibility across users, devices, and applications. Plus, it verifies their security state every time there is an access request.
The value added by implementing a Zero Trustapproach is clear. That's why Cisco moved from our traditional network-based perimeter and VPN model to a Zero Trust framework. Using our own Duo solution, we began implementing a zero trust approach to over 100,000 of our employees in 2020. We detailed our experience in our latest report:Zero Trust at ScaleA Case Study and BestPractices for Government.
As we did so we made four things clear that must happen every time someone tries to access an application on our networks:
Every time. No exceptions.
During our deployment we developed best practices that we feel public sector organizations like yours can also leverage to improve their success when transitioning to a Zero Trust approach. I've provided a very brief summary below and you can take a deeper dive into the details atZero Trust at ScaleA Case Study and BestPractices for Government.
Through our efforts, Cisco was able to deploy Duo configurations to more than 180,000 endpoints, including our entire fleet of Cisco-IT-managed iOS, Android, Mac, and Windows devices. We substantially increased our ability to react to device risk and found 86,000 devices in just one month that were concerns. And with Duo, users were able to self-remediate the issues themselves without having to contact tech support.
By adopting a Zero Trust at scale approach at Cisco, we've added a very strong and well-defined layer of security across tens of thousands of devices. We've enhanced our global network's stability and reliability. And, most importantly, we've given our workforce a greater sense of safety for their devices and data.
Local, state, and federal agencies can do the same by learning from our experience. We encourage you to download the full report that includes use cases and more detailed best practices for implementing Zero Trust at scale for your government agency. Now is the perfect time to take a proactive stance against the growing threats.
I encourage you to take a deeper dive into the subject by reviewingZero Trust at ScaleA Case Study and BestPractices for Government.
How to Enable Zero Trust Security
Zero Trust Frameworks Architecture Guide
Cisco Solutions for State and Local Government