2023-09-26 at 9:04 am
#41901

Participant
In my opinion, we can use preventive measures such as the “Zero trust security model”. It is a method that assumes that threats may exist on both inside and outside the network, which has strict identity verification and monitoring of user and device behaviour. In summary, this approach is about ensuring that access is only granted on a need-to-know basis, resulting in reducing the likelihood of getting the data stolen on the dark web or from inside man.