In June we wrote about ‘Zero Trust’ – how modern cybersecurity uses a layered approach before allowing access. Here we examine why your cybersecurity might not let you into your business IT accounts if you log in from an unknown laptop in an Australian cafe using just your password…
The scenario
You’re enjoying a lifelong dream to surf on Bondi Beach. But as you take a break from the sea, putting your feet up in at a backpacker’s internet cafe, you can’t resist logging in to check the latest sales figures. You enter your password – just like you do every day in the UK – but suddenly you’re blocked from accessing your account. Why? Because modern security systems have been designed to recognise when something seems off.
Here’s what’s happening behind the scenes:
- Location monitoring: your account is usually accessed from specific places. When you suddenly try to log in from a different country, the system flags this as unusual activity.
- Device recognition: security systems track the devices you commonly use. When a new or unknown device tries to access your account the system becomes suspicious.
- Behavioural analysis: modern cybersecurity doesn’t just check your password; it looks at how and where you’re logging in. If your login behaviour doesn’t match your usual pattern, it raises a red flag.
- The importance of MFA: Multi-Factor Authentication adds an extra layer of security by requiring something you know (your password) and something you have (like a code sent to your phone). Without this second layer, your account is much more vulnerable.
Layered security: the modern approach
Cybersecurity today is all about layers. Think of it like locking up your home. You wouldn’t just lock the front door and leave the windows wide open. Instead, you’d lock all the doors, close the windows, and maybe even set up a security system.
Here’s how layered security works:
- Password protection: this is your first line of defence. A strong, unique password is essential, but it’s just the beginning.
- Multi-Factor Authentication (MFA): this adds an additional layer by requiring a second form of verification, making it much harder for someone to access your account even if they have your password.
- Behavioural analytics: by monitoring how you typically use your account, security systems can detect unusual activity that might indicate a threat.
- Location and device tracking: These measures ensure that only trusted devices and locations can access your account, adding another layer of security.
Why you wouldn’t be trusted
When you try to log in from an unknown laptop in a foreign country without MFA, the security system sees multiple red flags. It doesn’t recognise the device, the location is unusual, and without the added verification from MFA, the system can’t be sure it’s really you trying to log in. This is why you wouldn’t be trusted in this scenario – it’s all about protecting your account from potential threats.
Conclusion: get back to the surf!
Rather than surfing the web (and your business accounts) get back on the board and learn to surf! But seriously, let us take your cybersecurity seriously so that you can have fun and stay safe. At Net Primates, we’re committed to keeping your accounts secure. By using layered security measures, we make sure that even if one layer is compromised, others are in place to protect your sensitive information. But we’ll also ensure that you can access your accounts when you need to – even if you should be enjoying yourself.



