What is layered security ? It’s a methodology to defend computer systems in layers rather than with just one source of security. For a business, it should look like this:
ISP – At the Internet Service Provider layer, there should be some type of security built into what specific traffic they will allow in and out of their networks. If your ISP has identified certain type of traffic as Ransomware, then it should be able to filter out that traffic.
Firewall – The next layer would be a good firewall at the edge of the internal network. All incoming and outgoing traffic has to go through this firewall. A good firewall will automatically update its definitions (threats it knows about) as well as filter certain types of content such as explicit material, and violent or illegal material. The firewall will block these sites, preventing access to them from the internal network. In addition, a firewall can filter out certain file types that hackers use to deliver their malicious payload, such as .exe and .zip. Other features include: gateway antivirus and intrusion prevention.
Computer Firewall – similar to the hardware appliance, the computer operating system has a built–in firewall that can prevent access to the system.
Desktop AV and Spyware Protection – Software antivirus and spyware protection runs in real–time to detect attacks against the system. It is best to use a reputable paid product such as Bitdefender and Malwarebytes.
Email Filter – Filters out viruses as well as spam from email before it can infect a computer through the email system.
Strong Passwords – at least 10 characters with a mix of uppercase, lowercase, letters, numbers and special characters. This means on everything, not just your computer. Hackers can crack weak passwords in seconds.
Backups, Backups, Backups – The only true way to secure and prevent data loss. If everything else fails and you fall victim to a cyber attack, such as a ransomware attack, backups are the best way to get things put back together.
End User Training – Arguably the most important security defense. End users must be aware of what threats look like. How to identify an email attack such as a phishing attack. How to read URLs so as to not venture off to an infected site. How to keep business and personal separate, especially for online shopping. Never use your business email for personal shopping. This is the best way to avoid getting tons of spam.
So, are you secure? If you are not, at a minimum, doing the things listed above, then no, you are not. Call us today for a security analysis to see if you are protected.