Security, That dirty word!

My first real blog just had to be about security!
By now you are probably overloaded with constant information coming at you about security, securing your data, systems, networks, computers and software. And rightly so, with so much information available on the internet and many systems now cloud based it is an important discussion to be had between you and your IT provider.
Securing your systems is important and will take a different approach for each business depending on your current setup, needs and possible regulatory requirements.

The Security Stack

A security stack is similar to house security in that is provides protection against different intrusion methods and can require different protection mechanisms.

  • Intruder through the door – requires door locks
  • Intruder through the window – requires glass breakage sensor
  • Intruder opens a window – requires a windows open/close sensor
    You may even put in security cameras as additional security

Now to your IT systems
There are 3 main intrusion methods cyber-criminals utilize to gain access to your data:

  • Password Guessing
  • Unpatched/unsecured Systems
  • Social Engineering

To secure your infrastructure from these methods you should look at a Security Stack that would implement all or some of the items in this list:

  • Anti-virus
  • DNS Filtering
  • Email protection
  • Firewall
  • Data Backup/recovery/testing
  • Data Encryption
  • Data Access Control
  • Security Awareness Training

Each one of these has a multitude of options for providing security. No security stack is the same and can be fluid and change over time as the models improve.

Of-course all the above would be simple if we all just worked from our office 9 to 5, never traveled anywhere, didn’t work from home or multiple locations, didn’t have smartphones or tablets and there were no cyber-criminals anywhere.

But in reality we do all of the above, we are probably too trusting and falsely believe we are “too small” to be hacked or scammed. This is NOT TRUE, everyone is a potential victim and we can do things to mitigate loss.

Next time we will go through the Stack and what each component is, how you can use/implement some or all components or tools and what steps you can take to further secure your business.

Stay Safe

Related Blog Posts

Cybersecurity for Small Businesses in Regional NSW

closeup photo of computer keyboard

The Server Refresh Deadline: Why Windows Server 2016’s End of Support Should Drive Your Cloud Migration Plan

Free attack unsecured laptop vector

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

Free cloud security database vector

The Daily Cloud Checkup: A Simple 15-Minute Routine to Prevent Misconfiguration and Data Leaks

Hardware & Software Procurement for Small Businesses in Regional NSW

Contact Us

Let’s Take a Look at Your Setup

If your IT feels a bit messy or you’re not sure what’s missing, we’ll help you get clarity. Book a free consult and we’ll walk through what you’ve got, what’s working, and what could be improved.

Get In Touch

Or call us direct on 0429 457 776

Get In Touch

Or call us direct on 0429 457 776