Two Post-Pandemic Technology Trends to Plan For

Two Post-Pandemic Technology Trends to Plan For

The past 12 months have been a time of monumental change for many businesses.  Driven by a global pandemic a new era of location independence has emerged and there are changes to be embraced, lessons to be learned, and trends to adopt.

Consider these two major technology trends meant to increase performance, simplify access and enhance security:

#1 Formally Integrate an IT Strategy into Your Business Plan

At the heart of everything your business does are two things – people and technology.  Your technology and need for flexibility in the workplace has evolved, and the ability to do more with less has increased.   

You need to deliver your product or services regardless of whether you have a physical location; and your people need to communicate easily, collaborate effortlessly and do both securely. 

You might be thinking about eliminating your office space and moving to 100% remote work.  You might be thinking about buying some apartments to let the business feel more like a work-from-home experience.  You might get everyone a subscription to a co-working space. You might continue buying computers for your staff.  You might give them a budget to buy what they wish and work from any device.   

Whatever the case, simply by taking a strategic approach to providing the right technology, you can make your employee’s jobs easier and allow them to perform with less complexity.  

Re-evaluate your core technologies and ensure they are:

  1. Flexible
  1. Cloud-Based (SaaS) or running in a cloud platform like AWS or Azure
  1. Easy to Secure  
  1. Have Collaboration Built-In  

As you start ramping back up post-pandemic and creating plans to help your business thrive in this new era – you should be asking questions and implementing a strategy that ensures your technology will empower your staff, protect your business and foster continued success.    

#2 Embrace the Concept of Zero Trust  

With company data now being accessed from anywhere, on any device, at any time, you need to embrace the concept of Zero Trust.  The threat landscape has shifted, and the Zero Trust model is designed to protect modern IT environments by leveraging network segmentation, preventing lateral movement, and simplifying user-access.    

Traditional security operates on the assumption that everything inside an organization’s network should be trusted. It assumes a user’s identity is not compromised and that all users act responsibly and can be trusted.  

The Zero Trust model take the opposite approach by considering trust a vulnerability. Here’s how it works:

  1. Identify your “protect surface” which is made up of your network’s most critical and valuable Data, Assets, Applications and Services (or DAAS).  Your protect surface is smaller than your attack surface, and it is always knowable.
  1. Zero Trust is a flow-based architecture so identifying how traffic moves across the organization in relation to the protect surface is vital. Understand your users, their tools/applications, and how they connect to determine enforceable policies that ensure secure access.
  1. Once you can visualize your system designs, the flow maps will tell you where you need to insert controls. Start with what you know, but don’t delay your Zero Trust initiative just because you don’t have perfect knowledge.
  1. Create a “perimeter” by putting controls in place as close to the protect surface as possible. The perimeter is created by deploying a segmentation gateway, or next-generation firewall, to ensure only known, allowed traffic and legitimate applications have access.  Consider how this changes with staff working from homes and flexible working locations moving forward.  
  2. Finally, monitor your network and analyze all internal and external security logs, focusing on the operational aspects of Zero Trust. The more your network is attacked, the stronger it will become, with greater insight into making policies more secure

For those of us lucky enough to make it through the last year with our business intact, the road ahead is still wildly uncertain.  By integrating short and long-term technology strategies into your Business Plan, and adopting a Zero Trust security posture your business can be on a path to make this critical turn toward a new dawn.  

Have more questions? Call, email, or set a time on our calendar if you’d like to have a conversation about the obstacles your business faces and see how we may be able to be a resource.  

*Article was based on information published at

https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture

https://www.rantek.dk/news/simplify-zero-trust-implementation-with-a-five-step-methodology