I'm John Hill, CEO for TechSage Solutions. Back on the strategic planning deck again. Some of you, hopefully many of you have been hearing about something called Zero Trust. It's becoming the security model of choice by many cybersecurity experts. I'm anticipating this to be the new standard to meet data protection. Compliance for most, if not all, companies and organizations, both large and small. So here's what you need to know about it. When it's implemented, only the applications and log ins that you pre-approve are allowed and everything else is treated with zero trust. In effect, locking down your network on a computer network, that means that applications like Office, maybe QuickBooks and others are usually allowed, but not something that's completely new or unvetted.

If you'd like to find out more about Zero Trust, or if you have questions about cybersecurity or some other I.T. related issues, you can schedule a short free consultation with me to discuss these issues and perhaps why you should really get a cybersecurity risk assessment for your business and how you can do it. Please go to www.techsagesolutions com. Let's talk soon.

Until then, stay safe and avoid cybersecurity risk. Thanks for joining me today for my thoughts from the day. If you found it useful, please feel free to share it with your friends. Cheers.