How do I protect my company from IT security threats?

When it comes to keeping your business safe and secure in the IT world – there is no silver bullet single solution that will fix all of your security needs in just one simple package. An organization’s IT security should use multiple layers and multiple tools to identify, stop and pro-actively prevent threats from negatively impacting your network and your users. While no system is 100% foolproof – the more security layers you implement for your organization, you can at least rest assured that you’ve made every effort at any budget level to stave off and defend yourself against threats.

Here’s a basic five tiered infrastructure security system that is relatively easy to have implemented on your network within one to two weeks from order to full implementation.

  1. Spam Filtration

    For all email users in your organization. A good spam filter will help keep your Inbox cleaner and safer by rooting out and catching easily detectable harmful emails before they can even make their way into your Inbox. As they’re not in your Inbox to start with – users won’t be able to open them and/or click on any embedded files or links. A good spam filter will come with a daily report showing you exactly which messages got caught so you’re able to release any that you do need. A good business grade spam filter will catch more than 98% of what it’s supposed to with only a message or two per month that it caught that it shouldn’t have.

    Add an outbound spam filter (Smart Host) to prevent your employees from inadvertently sending emails that may contain viruses or malware which could damage the reputation of your domain.

  2. Business Grade Antivirus

    Installed on ALL PC’s and on ALL of your servers. The product you choose should protect you from malware, viruses, ransomware, worms and spyware. It predominantly keeps you safe as a user from threats encountered while visiting a website, as well as from unsecure emails that are more sophisticated and made their way through your spam filter and into your Inbox. A good antivirus will automatically detect an email or website when opened that is viewed as a threat and will warn you and/or prevent you from even opening.

    We lead with ESET’s NOD32 Antivirus software for our clients (www.eset.com) @ESET . It’s a light weight but very effective product that automatically updates its virus signatures on a daily basis.

  3. Secure Internet Edge

    A firewall is a physical or virtual appliance that literally sits in between your network and the internet. Your firewall will control who has access to your network and will control content. You decide who and what traffic is allowed to pass between your network and the internet. Your firewall provides a defense against hackers intentionally targeting your network as well as from automated bots roaming the internet looking for any openings it can find in yours or anyone’s network.

    Modern Data leads with Cisco’s Adaptive Security Appliances (ASA) (www.cisco.com) @Cisco The Cisco ASA 5500-X series product line provides several options depending on the size and complexity of your network.

  4. Deep Traffic Inspection

    An add-on option for Cisco’s ASA firewalls is its FirePOWER Services module. Cisco FirePOWER Services provide real time scanning of internet traffic flowing through your firewall and into your network. Intrusion Prevention (IPS), Advanced Malware Protection (AMP) and URL Filtering (URL) allow for all content to be scanned and blocked as needed in real time.

  5. Cloud Based Endpoint Protection

    The fifth layer of your security plan should include a line of defense for your users no matter where they’re working in the world. Cisco’s Umbrella platform protects your end points whether your employee is in the office, traveling or working from home. Workers are mobile and working from all corners of the world – and they’re often not logged into your work network where they would normally be protected by your in-house firewall and infrastructure. Cisco’s Umbrella services project your users devices as endpoints wherever they’re connected to the Internet and proactively stops threats from known hazardous sites. It blocks malicious destinations before a connection is ever established. It is a secure internet gateway in the cloud that provides the first line of defense against threats on the internet wherever users go.

Each of the above can be built in steps over time or all at once – but the important part is having a plan that suits your business needs and then start to build it out.

Get started on your security plan today.

More Articles