{"id":3090,"date":"2023-08-01T09:27:39","date_gmt":"2023-08-01T07:27:39","guid":{"rendered":"https:\/\/cloudware.pl\/?p=3090"},"modified":"2026-02-18T15:47:26","modified_gmt":"2026-02-18T14:47:26","slug":"czy-naprawde-musimy-uwazac-na-kazdy-link-w-ktory-klikamy","status":"publish","type":"post","link":"https:\/\/cloudware.pl\/en\/czy-naprawde-musimy-uwazac-na-kazdy-link-w-ktory-klikamy\/","title":{"rendered":"Do we really need to be cautious about every link we click?"},"content":{"rendered":"<p>With the advancement of technology, hackers are finding increasingly creative ways to carry out cyber attacks. Times have changed - and it's worth acknowledging. For example, when we click on a link sent to us, we immediately check if it looks suspicious to us - unconsciously employing a strategy of limited trust.<\/p>\n<p>Zero Trust natomiast dzia\u0142a pod za\u0142o\u017ceniem &#8222;nigdy nie ufaj, zawsze sprawdzaj&#8221;. Powinni\u015bmy traktowa\u0107 ka\u017cdego u\u017cytkownika, urz\u0105dzenie lub aplikacj\u0119 pr\u00f3buj\u0105ce uzyska\u0107 dost\u0119p do sieci jako potencjalnie z\u0142o\u015bliwe, dop\u00f3ki nie udowodni\u0105 swojej niewinno\u015bci.<\/p>\n<p><strong>What are<\/strong><strong>the main principles of the Zero Trust strategy?<\/strong><strong><br \/>\n<\/strong><br \/>\n<strong>Educate your employees!<\/strong><\/p>\n<p>Frequent training and education in security are extremely important. They also contribute to increasing security awareness within the organization.<\/p>\n<p><strong>Trust no one!<\/strong><\/p>\n<p>The \"Zero Trust\" approach assumes that every device and connection on the network poses a potential threat and must be authorized. By adopting this approach, we treat every user, device, or application trying to access the network as potentially dangerous.<\/p>\n<p><strong>Control access grants!<\/strong><\/p>\n<p>The Zero Trust IBM approach emphasizes granting the minimum level of access required for users, devices, and applications to perform their specific tasks. Strictly limiting permissions significantly enhances the security of resources in our company.<\/p>","protected":false},"excerpt":{"rendered":"<p>Wraz z rozwojem technologii hakerzy znajduj\u0105 coraz bardziej kreatywne sposoby przeprowadzania atak\u00f3w hakerskich. Czasy si\u0119 zmieni\u0142y &#8211; i warto to przyzna\u0107. Przyk\u0142adowo: gdy klikamy w wys\u0142any nam link to od razu sprawdzamy, czy nie wygl\u0105da on dla nas podejrzanie &#8211; nie\u015bwiadomie stosujemy w\u0142a\u015bnie strategi\u0119 ograniczonego zaufania. Zero Trust natomiast dzia\u0142a pod za\u0142o\u017ceniem &#8222;nigdy nie ufaj, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3091,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[25,31,26,43],"class_list":["post-3090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyberbezpieczenstwo","tag-ibm","tag-pracownicyit","tag-zerotrust"],"_links":{"self":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/3090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/comments?post=3090"}],"version-history":[{"count":1,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/3090\/revisions"}],"predecessor-version":[{"id":3092,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/posts\/3090\/revisions\/3092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/media\/3091"}],"wp:attachment":[{"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/media?parent=3090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/categories?post=3090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudware.pl\/en\/wp-json\/wp\/v2\/tags?post=3090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}