The document presents a discussion on the zero-trust model of information security, emphasizing new threats and the inadequacies of current trust models. It highlights a significant case of identity theft perpetrated by an insider, underscoring the need for enhanced security protocols. Recommendations include adopting a data-centric security approach and implementing stricter access controls while designing networks with zero-trust principles.