Reimagine growth at Elevate – Dallas 2025. See the Agenda.

zero-trust
zero-trust

In an era where zero-trust dominates enterprise security playbooks with talks about hardened endpoints, Multi Factor Authentication (MFA) rollouts, and behavioural anomaly detection, service desk remains surprisingly exposed. Amid all this noise of layered security investments, a simple phone call still breaks the chain. 

Reach out to discuss this topic in depth.  

Case in point: In July 2025, Clorox became the latest victim. Attackers allegedly tricked a Level 1 service desk agent into resetting credentials and bypassing MFA bringing operations to a halt and triggering a US$380 million lawsuit. However, Clorox is not an outlier it is just the latest reminder that the service desk remains one of the softest spots in the zero-trust stack. 

Consider the recent lineup of service desk breaches: 

  • MGM resorts (2023): ALPHV/BlackCat spent ten minutes on LinkedIn, phoned the service desk, and shut down hotels and casinos for ten days 
  • Caesars entertainment (2023): The same gang socially engineered service desk staff, exfiltrated loyalty data, and allegedly collected a $30 million ransom  
  • Kojima Industries (2022): A supplier-desk breach halted Kanban Information Technology (IT) and idled 14 plants, leading to a loss of 13 000 cars in a day 

The lesson: Service desks are not just support channels; they’re the soft underbelly for enterprise breaches. Zero-trust fails if the first hello isn’t protected. 

The help desk breach map 

Despite security spend elsewhere, service desks often rely on fragile processes, skipped checks, broad access, weak ID proofing, and limited logging. These gaps make Level 0/1 a high-risk entry point, where a single lapse can undo downstream controls. 

The below table shows how such failures have led to major breaches: 

Exhibit 1: Cases of help desk exploits across the industry 

Breach trigger Breach (year) Root cause 
Human lapse Marks & Spencer ’25 Agent rushed, skipped checks 
Excess privilege Storm-1811 Quick Assist ’24 Screen-share opened domain-admin rights 
Logging gaps Okta Support ’23 → scope revised ’24 Audit trail too narrow to trace impact 
Proofing (ID) Clorox vs Cognizant ’23/’25 Voice accepted as identity 

 
These controls were built assuming everything goes right. Zero-trust, by definition, must hold even when everything goes wrong. However, a single lapse in human judgment and the chain snaps. 

Redesigning the service desk: Automate trust from the first touch 

True zero-trust starts before an attacker ever reaches the console. That means a modern service desk should work in a closed-loop defence where artificial intelligence (AI) and humans reinforce each other. 

Exhibit 2 showcase how AI guardrails + human judgement = Secure service desk 

Screenshot 2025 08 11 142014

Building blocks of a secure service desk 

  • Adaptive identity proofing: Verify users based on contextual risk not just static credentials, before executing any sensitive request. 
  • Dual-authorization protocols: No single agent should have the ability to override MFA or escalate access alone. 
  • Just-in-time entitlements: Grant temporary, purpose-bound privileges that auto-expire. 
  • Immutable audit trails: Stream all service desk activity into a central Security Information and Event Management (SIEM) to enable traceability and real-time anomaly detection. 
  • AI-human feedback loops: Use telemetry to retrain models and improve workflows, so defences evolve with attack patterns. 

Regulatory tailwinds are also catching up 

The regulatory climate is catching up from guidance to enforcement, with new mandates placing direct accountability on internal support functions including the service desk 

  • NIST SP 800-207: Mandates uniform policy enforcement across user tiers including internal actors like help desk personnel 
  • EU NIS2 Directive (2025): Expected to tighten service desk controls with requirements for override logging, risk scoring, and escalation workflows 

Non-compliance won’t just mean fines it will mean boardroom accountability. 

What enterprise leaders must do now 

To close the most human vulnerability in the security stack, enterprise Chief Information Security Officers (CISOs) and Chief Operating Officers (COOs) should: 

  • Push zero-trust enforcement to Level 0: Embed AI-driven context-aware identity verification into service-desk workflows 
  • Kill one-click overrides: Mandate dual approvals for high-risk actions like MFA resets, access escalation, or device provisioning 
  • Instrument full-stack observability: Log agent actions, reasons, and decisions in real time, feeding an observability tower for forensic analysis and pattern detection 
  • Deploy Agentic AI agents: Use autonomous agents to monitor risk scores, enforce escalation protocols, and trigger real-time interventions 
  • Elevate the desk to a control tower: Track Key Performance Indicators (KPIs) for breach resistance, verification accuracy, and retraining cadence 
  • Simulate, stress, and improve: Run regular social engineering drills to test frontline response and adapt quickly. Use each attempt to fine-tune controls, update playbooks, and evolve defences, continuous improvement is the only defence against evolving threats 

Trust is earned at the first hello 

Enterprises have invested heavily in digital perimeter defences, but attackers aren’t breaking down firewalls anymore; they’re simply walking through the front door.  

As social engineering and AI-driven impersonation accelerates, service desks must evolve from vulnerability to vanguard in the enterprise security posture.  

To help benchmark your service desk’s zero-trust readiness, or discuss your digital workplace journey reach out to: [email protected] and [email protected] 

More from Blogs