{"id":1411,"date":"2021-06-15T14:28:00","date_gmt":"2021-06-15T14:28:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/security-trust-principles\/"},"modified":"2023-05-17T00:30:26","modified_gmt":"2023-05-17T00:30:26","slug":"security-trust-principles","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/","title":{"rendered":"How to use the 5 trust principles to improve cybersecurity"},"content":{"rendered":"<p>Cybersecurity matters when it comes to your brand reputation.<\/p>\n<p><strong><em>Trust is earned when actions meet words.<\/em><\/strong> <em>\u2014 Chris Butler<\/em><\/p>\n<p>The quote above encapsulates the definition of trust \u2014 walking the walk after talking the talk. When it comes to the business world, brand reputation is built on earned trust and perceived integrity. For a business to succeed, trust must be built internally with employees and externally with customers, partners, vendors, and the community.<\/p>\n<p>In today\u2019s digital business world, a large component of trustworthiness depends on business processes and data governance. With the massive amount of sensitive data and personally identifiable information (PII) that businesses of every size collect daily, customers and employees have to trust that organizations are acting responsibly with their information. And it can impact the bottom line:<\/p>\n<p>&#8211; <strong><a href=\"https:\/\/www.centrify.com\/media\/4737054\/ponemon_data_breach_impact_study.pdf\" target=\"_blank\" rel=\"noopener\">65% of data breach victims<\/a> lost trust<\/strong> in an organization due to the breach<\/p>\n<p>&#8211; <strong><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/12\/08\/mind-the-trust-gap-how-companies-can-retain-customers-after-a-security-breach\/?sh=57e327386c95\" target=\"_blank\" rel=\"noopener\">80% of consumers<\/a> will move to a competitor<\/strong> if they don\u2019t trust an organization is handling their data responsibly<\/p>\n<p>So how does a business go about defining and measuring something as seemingly intangible as &#8220;trust?&#8221; The <a href=\"https:\/\/www.aicpa.org\/\" target=\"_blank\" rel=\"noopener\">American Institute of Certified Public Accountants (AICPA)<\/a> developed the <a href=\"https:\/\/www.aicpa.org\/interestareas\/frc\/assuranceadvisoryservices\/trustdataintegritytaskforce.html\" target=\"_blank\" rel=\"noopener\">5 Trust Services Criteria (formerly Principles).<\/a> They are meant to be used in SOC 2 certifications and compliance audits, but provide a great framework to apply to any business interested in assessing and improving their trust levels.<\/p>\n<p>Below, we dive into how these five trust principles can be used to help improve your cybersecurity stance.<\/p>\n<h3>1.\u00a0\u00a0 Security<\/h3>\n<p>The AICPA defines security to mean that<strong> &#8220;<\/strong>information and\u00a0systems are protected against unauthorized access and disclosure.&#8221; This requires a proactive stance \u2014 you\u2019ve got to take action and put safeguards in place to defend your systems and data from being accessed by the wrong people.<\/p>\n<p>To provide comprehensive coverage against a variety of attack vectors, cybersecurity experts recommend <a href=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" target=\"_blank\" rel=\"noopener\">a layered approach<\/a> that stacks solutions such as endpoint security, email and anti-phishing security, network security, mobile security, and end user security training.<\/p>\n<p>A crucial component of cybersecurity is identity protection and access management to allow the right people in and keep the wrong people out of your systems, apps, and data. This includes:<\/p>\n<p>&#8211; Enforcing strong password policies<\/p>\n<p>&#8211; Providing a password management tool to help employees comply with password policies<\/p>\n<p>&#8211; Enabling multifactor authentication<\/p>\n<p>&#8211; Applying conditional access rules<\/p>\n<h3>2.\u00a0\u00a0 Confidentiality<\/h3>\n<p>Confidentiality is about protecting information. Ensuring confidentiality across an organization requires appropriate data governance, so that only the right people have access to the level of information that they require. However, one survey found <a href=\"https:\/\/www.getapp.com\/resources\/data-classification-levels\/\" target=\"_blank\" rel=\"noopener\">that 48% of businesses<\/a> allow employees to access more data than necessary and 12% allow employees to access <em>all <\/em>company data! Do you know how much access to company data your employees have?<\/p>\n<p>By using a &#8220;least privilege&#8221; model of data governance, you can ensure that people in your organization only have access to the lowest level of information they need to do their job \u2014 thus reducing the chance of sensitive or proprietary information being leaked. This requires data classification policies that restrict access based on classification level. <a href=\"https:\/\/www.getapp.com\/resources\/data-classification-levels\/\" target=\"_blank\" rel=\"noopener\">Common classification levels<\/a> used within businesses are &#8220;public,&#8221; &#8220;internal,&#8221; &#8220;sensitive,&#8221; &#8220;proprietary,&#8221; &#8220;highly confidential,&#8221; and &#8220;restricted.&#8221; Keep it simple and don\u2019t make too many classification categories or else you risk confusing employees, leading to wrongly classified documents.<\/p>\n<p>Email and file encryption is another important element of confidentiality to ensure that only the intended receiver can read the information. Encryption protects data in transit to ensure it cannot be intercepted and read.<\/p>\n<h3><\/h3>\n<h3>3.\u00a0\u00a0 Privacy<\/h3>\n<p>Confidentiality and privacy are closely related and can almost seem like synonyms, but there are nuances. Confidentiality is focused on protecting information, while privacy is about protecting identities.<\/p>\n<p>In the digital age, data that can be used to find, locate, or identify someone is called personally identifiable information (PII). This includes information such as:<\/p>\n<p>&#8211; Full legal name<\/p>\n<p>&#8211; Social Security number (US)<\/p>\n<p>&#8211; National Insurance number (UK)<\/p>\n<p>&#8211; Driver\u2019s license or passport number<\/p>\n<p>&#8211; Bank account number<\/p>\n<p>&#8211; Home address<\/p>\n<p>&#8211; Email address<\/p>\n<p>&#8211; Biometric information<\/p>\n<p>&#8211; Information such as place of birth, date of birth, and mother\u2019s maiden name<\/p>\n<p>PII is a valuable target for attackers during a data breach. And in a world where consumers must set up online accounts to do business with most organizations, personal data is constantly at risk. In fact, <a href=\"https:\/\/www.statista.com\/statistics\/273550\/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed\/\" target=\"_blank\" rel=\"noopener\">155.8 million individuals<\/a> in the US were affected by a data exposure in 2020 and <a href=\"https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/\" target=\"_blank\" rel=\"noopener\">70% of Americans<\/a> say their personal data is less secure now than it was five years ago.<\/p>\n<p>To protect consumers, legislation has begun to catch up through regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) and the California Consumer Privacy Act (CCPA) in the US, and the General Data Protection Regulation (GDPR) in Europe. Companies must ensure that they are complying with all relevant regulations for their location and industry or else face fines, penalties, and even legal action.<\/p>\n<p>Data loss prevention solutions use policy templates and classification labels to identify sensitive information and prevent it from leaving the organization or being shared with the wrong people. For example, you could create a policy to identify Social Security number formats which would flag any numbers structured as XXX-XX-XXXX from being forwarded, printed, or viewed in documents or emails.<\/p>\n<h3>4.\u00a0\u00a0 Availability<\/h3>\n<p>Availability, according to the AICPA, means that &#8220;information and systems are available for operation.&#8221; When assessing availability, take a moment to think about these questions:<\/p>\n<p>&#8211; Are your systems able to run at capacity?<\/p>\n<p>&#8211; Are you backing up data to the cloud to ensure access in the case of a system failure?<\/p>\n<p>&#8211; Do you have business continuity and disaster recovery solutions in place to ensure your business can continue mission-critical operations in the face of a disruption, such as natural disasters, power outages, or cyberattacks?<\/p>\n<p>&#8211; Do you have an emergency communications plan?<\/p>\n<p>&#8211; Do you regularly test your disaster response plans?<\/p>\n<h3>5.\u00a0\u00a0 Processing Integrity<\/h3>\n<p>The AICPA defines process integrity as making sure that &#8220;system processing is complete, valid, accurate, timely, and authorized to meet the entity\u2019s objectives.&#8221; This includes accurate data processing and storage from end-to-end. Do the outputs of your systems align with the inputs? If you have processing errors, do you address them in a timely way? How do you store, backup, and archive data?<\/p>\n<p>Correct processing means that your organization is operating in the way it intends to, and is providing the services it agrees to provide at the level it agrees to provide them. This is hugely important to your brand reputation \u2014 if customers don\u2019t receive the service or product they expect, they will no longer trust your business.<\/p>\n<h2>Where to Start?<\/h2>\n<p>Improving your business\u2019 trustworthiness in our digital world relies heavily on the integrity of your data defense. However, from identity management to data protection to email security and more, cybersecurity requires layers of solutions and processes \u2014 and sometimes it can be tough to know where to start.<\/p>\n<p>Pax8 is here to help. Our solution consultants are standing by to help you find the right solutions to strategically build out and standardize your stack. They can talk you through our catalog of industry-leading <a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/category\/security\/\">security<\/a> and <a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/category\/continuity\/\">continuity<\/a> vendors to identify complementary solutions that are the right fit for you and your clients\u2019 business needs.<\/p>\n<p>You can also check out the <a href=\"https:\/\/go.pax8.com\/rs\/878-YDC-715\/images\/Guide.to.Selling.Security.pdf\" target=\"_blank\" rel=\"noopener\">MSP\u2019s Guide to a Multi-Layered Security Approach<\/a> that breaks down eight steps to ensure your security practice covers the full lifecycle of cybersecurity management.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8nebula.com\/m\/45177639b3ef621e\/original\/EN-US_MSPs-Guide-LayeredSecurityApproach-April2023.pdf\">Get the guide<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity matters when it comes to your brand reputation. Trust is earned when actions meet words. \u2014 Chris Butler The quote above encapsulates the definition of trust \u2014 walking the walk after talking the talk. When it comes to the business world, brand reputation is built on earned trust and perceived integrity. For a business [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":203,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8,4,16,5,9],"tags":[],"class_list":["post-1411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-advisors","category-msp","category-uk","category-security","category-telco-agents"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to use the 5 trust principles to improve cybersecurity - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/security-trust-principles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to use the 5 trust principles to improve cybersecurity - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/security-trust-principles\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-15T14:28:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T00:30:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"How to use the 5 trust principles to improve cybersecurity\",\"datePublished\":\"2021-06-15T14:28:00+00:00\",\"dateModified\":\"2023-05-17T00:30:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/\"},\"wordCount\":1247,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/AdobeStock_156873824_adobespark-1.jpeg\",\"articleSection\":[\"Business advisors\",\"MSPs\",\"Pax8 UK\",\"Security\",\"Telco agents\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/\",\"name\":\"How to use the 5 trust principles to improve cybersecurity - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/AdobeStock_156873824_adobespark-1.jpeg\",\"datePublished\":\"2021-06-15T14:28:00+00:00\",\"dateModified\":\"2023-05-17T00:30:26+00:00\",\"description\":\"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/AdobeStock_156873824_adobespark-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/AdobeStock_156873824_adobespark-1.jpeg\",\"width\":2000,\"height\":1333,\"caption\":\"5 trust principles for cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-trust-principles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to use the 5 trust principles to improve cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to use the 5 trust principles to improve cybersecurity - Pax8 Blog","description":"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/","og_locale":"en_US","og_type":"article","og_title":"How to use the 5 trust principles to improve cybersecurity - Pax8 Blog","og_description":"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.","og_url":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/","og_site_name":"Pax8 Blog","article_published_time":"2021-06-15T14:28:00+00:00","article_modified_time":"2023-05-17T00:30:26+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"How to use the 5 trust principles to improve cybersecurity","datePublished":"2021-06-15T14:28:00+00:00","dateModified":"2023-05-17T00:30:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/"},"wordCount":1247,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg","articleSection":["Business advisors","MSPs","Pax8 UK","Security","Telco agents"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/","url":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/","name":"How to use the 5 trust principles to improve cybersecurity - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg","datePublished":"2021-06-15T14:28:00+00:00","dateModified":"2023-05-17T00:30:26+00:00","description":"Learn how to use the 5 trust principles as a framework to improve your cybersecurity stance \u2014 and preserve your brand reputation.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/security-trust-principles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/AdobeStock_156873824_adobespark-1.jpeg","width":2000,"height":1333,"caption":"5 trust principles for cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/security-trust-principles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to use the 5 trust principles to improve cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1411"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1411\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/203"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}