This post was originally published by Jacob Serpa.
As the old adage goes, “Trust must be earned.” This proverb essentially means that trusting those who are not truly trustworthy can have harmful results. Interestingly, this wisdom is particularly applicable to cybersecurity. There are countless external (and internal) threat actors that would love to take advantage of overly trusting enterprises in order to access their IT systems and steal their data. Consequently, organizations must make certain that they are granting access to trustworthy users only.