Core Services
Why Secure Access Keeps Coming Back Into Focus
It’s no secret that organisations in general have been moving away from traditional methods of securing their network traffic. This of course is nothing new, and the technologies around it have been here for a while now. Even the relatively new term SASE was coined back in 2019. So why does this seem to keep surfacing as a hot topic? I believe it’s because even though most professionals know it’s an option, it’s not always the most straightforward thing to implement.
We’ve seen an ever increasing number of attacks on organisations, but the focus has pivoted to impersonating or breaching individuals to bypass the traditional perimeter. Recent 2025 and early 2026 high-profile breaches – such as Scattered Spider attacks on UK retailers and vishing campaigns targeting SSO credentials – have all been tied to one person being targeted, compromised via social engineering and then used to gain access into wider networks. We’ve seen this extend into supply chain attacks as well, proving that the threat extends beyond your own networks.
Redefining Your Guardrails Through Identity
As we’ve explored previously in our blog, ‘What is Identity in Cyber Security? It’s Not Who You Say You Are’ modern security isn’t just about checking a username. The breaches of the last 12 months have taught us three critical lessons:
- 2FA is no longer a silver bullet: Attackers are now socially engineering the authentication process itself (AI-generated voice/video) or using ‘MFA fatigue’ to bypass traditional prompts. In 2025, vishing attacks surged by over 440% due to AI deepfakes, proving that human judgment is being outpaced by technology.
- Context is King: A stolen password is useless if your system can see the request is coming from an unmanaged device in a geographic location you never visit.
- Validation must be continuous: Authentication shouldn’t just happen at the start of a session. As per the latest NCSC Zero Trust guidelines (reviewed Jan 2026), we should continue to validate user and device properties throughout the session to prevent lateral movement.
So even though the reasoning has changed somewhat, the impact of deploying something in the secure access space can make huge differences to your security posture. Many organisations may be using a secure access product to help solve connectivity issues and not realising the potential security at their fingertips. Others might be looking at implementing without knowing the extra power they gain by doing so.
