How zero-trust methods thwart malicious hackers