Research has shown that a large majority of businesses are shifting over to zero trust and this is likely because of a big increase in the risk of cybercrime. So, what is zero trust? It is an approach to system design where inherent trust in the network is removed and instead the network is assumed as hostile. Each access request is verified individually based on a set access policy.
The aim of zero trust is to protect resources e.g. assets, services, network accounts etc. and not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.
We would like to remind you that while zero trust is a good security architecture to have, it must be set up correctly.
You can read the NCSC's guide here.