A new breed of cyber security is emerging that makes the user an integral part of the process, making it much harder for systems to be hacked
Called “user as a key” architecture, zero knowledge cryptography methods make it possible for a user to complete a process or function within a system, and then leave, taking their digital footprint with them
This makes it near impossible for hackers to gain access to multiple parts of a system, as each user only holds the information needed to access their own data, and no one else’s
This model also stops administrators from being able to access customers’ data, providing an additional level of security and peace of mind